Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
#1

A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are both intuitive and secure. Simultaneous shaking is proposed as a novel and easy-to-use mechanism for pairing of small mobile devices. The underlying principle is to use common movement as a secret that the involved devices share for mutual authentication. We present two concrete methods, ShaVe and ShaCK, in which sensing and analysis of shaking movement is combined with cryptographic protocols for secure authentication. ShaVe is based on initial key exchange followed by exchange and comparison of sensor data for verification of key authenticity. ShaCK, in contrast, is based on matching features extracted from the sensor data to construct a cryptographic key. The classification algorithms used in our approach are shown to robustly separate simultaneous shaking of two devices from other concurrent movement of a pair of devices, with a false negative rate of under 12 percent. A user study confirms that the method is intuitive and easy to use, as users can shake devices in an arbitrary pattern.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: what is existing technology before dtmf to control devices, new sencer bore well rigs, how to do well in socratic, shake table project, advertisement evaluation of rasna shake up tv commercial, ancouring script before saraswati vandana, kintapo college of health and well being,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,052 15-02-2017, 03:40 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 904 14-02-2017, 03:49 PM
Last Post: jaseela123d
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 20,950 06-03-2015, 07:18 PM
Last Post: unas
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,924 25-02-2015, 07:17 AM
Last Post: Guest
  Mobile shop management System computer science technology 7 14,751 01-07-2014, 06:21 PM
Last Post: seminar report asees
  Secure Multipart File Transfer projectsofme 4 3,753 07-03-2013, 05:16 PM
Last Post: Guest
  DISTRIBUTED MOBILITY MANAGEMENT FOR TARGET TACKING IN MOBILE SENSOR NETWORKS computer science technology 4 3,917 22-02-2013, 03:05 PM
Last Post: seminar details
  controlling a pc using a mobile phone mechanical engineering crazy 4 2,920 08-02-2013, 10:31 AM
Last Post: seminar details
  mobile computing project ideas computer science topics 5 6,324 29-01-2013, 10:42 AM
Last Post: seminar details
  Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Projects9 1 1,450 08-01-2013, 02:25 PM
Last Post: Guest

Forum Jump: