Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
#1

A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are both intuitive and secure. Simultaneous shaking is proposed as a novel and easy-to-use mechanism for pairing of small mobile devices. The underlying principle is to use common movement as a secret that the involved devices share for mutual authentication. We present two concrete methods, ShaVe and ShaCK, in which sensing and analysis of shaking movement is combined with cryptographic protocols for secure authentication. ShaVe is based on initial key exchange followed by exchange and comparison of sensor data for verification of key authenticity. ShaCK, in contrast, is based on matching features extracted from the sensor data to construct a cryptographic key. The classification algorithms used in our approach are shown to robustly separate simultaneous shaking of two devices from other concurrent movement of a pair of devices, with a false negative rate of under 12 percent. A user study confirms that the method is intuitive and easy to use, as users can shake devices in an arbitrary pattern.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: self declaration by applicant before ri, intuitive davinci clutch instructions ppt, rasna shake up profile pictures, before start of, use of shake table in civil engineering ppt, application scalability before, sayeri for ankring well come program,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,048 15-02-2017, 03:40 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 900 14-02-2017, 03:49 PM
Last Post: jaseela123d
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 20,930 06-03-2015, 07:18 PM
Last Post: unas
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,920 25-02-2015, 07:17 AM
Last Post: Guest
  Mobile shop management System computer science technology 7 14,734 01-07-2014, 06:21 PM
Last Post: seminar report asees
  Secure Multipart File Transfer projectsofme 4 3,749 07-03-2013, 05:16 PM
Last Post: Guest
  DISTRIBUTED MOBILITY MANAGEMENT FOR TARGET TACKING IN MOBILE SENSOR NETWORKS computer science technology 4 3,912 22-02-2013, 03:05 PM
Last Post: seminar details
  controlling a pc using a mobile phone mechanical engineering crazy 4 2,912 08-02-2013, 10:31 AM
Last Post: seminar details
  mobile computing project ideas computer science topics 5 6,319 29-01-2013, 10:42 AM
Last Post: seminar details
  Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Projects9 1 1,444 08-01-2013, 02:25 PM
Last Post: Guest

Forum Jump: