Communications of the ACM
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Proceedings of the 3rd international conference on Mobile systems, applications, and services
A relative positioning system for co-located mobile devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Side-Channel Issues for Designing Secure Hardware Implementations
IOLTS '05 Proceedings of the 11th IEEE International On-Line Testing Symposium
Sensing and visualizing spatial relations of mobile devices
Proceedings of the 18th annual ACM symposium on User interface software and technology
Analyzing features for activity recognition
Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
Loud and Clear: Human-Verifiable Authentication Based on Audio
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
A Human-Verifiable Authentication Protocol Using Visible Laser Light
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Proceedings of the 13th international conference on Security protocols
LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
New directions in cryptography
IEEE Transactions on Information Theory
Context-based security: state of the art, open research topics and a case study
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Entropy of audio fingerprints for unobtrusive device authentication
CONTEXT'11 Proceedings of the 7th international and interdisciplinary conference on Modeling and using context
RhythmLink: securely pairing I/O-constrained devices by tapping
Proceedings of the 24th annual ACM symposium on User interface software and technology
Hi-index | 0.00 |
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets, wireless LAN access points, or printers, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. In this article, we describe three different authentication methods for device-to-device authentication based on sensor data from various physical out-of-band channels: shaking devices together, authentication based on spatial reference, and transmission via visible laser.