Communications of the ACM
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Practical Cryptography
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Proceedings of the 3rd international conference on Mobile systems, applications, and services
A relative positioning system for co-located mobile devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Sensing and visualizing spatial relations of mobile devices
Proceedings of the 18th annual ACM symposium on User interface software and technology
Loud and Clear: Human-Verifiable Authentication Based on Audio
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Theorizing mobility in community networks
International Journal of Human-Computer Studies
Using audio in secure device pairing
International Journal of Security and Networks
Supporting device discovery and spontaneous interaction with spatial references
Personal and Ubiquitous Computing
Point&Connect: intention-based device pairing for mobile phone users
Proceedings of the 7th international conference on Mobile systems, applications, and services
Using a spatial context authentication proxy for establishing secure wireless connections
Journal of Mobile Multimedia
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction opportunities in accordance with their situation. However, it is difficult to secure spontaneous interaction as this requires authentication of the encountered device, in the absence of any prior knowledge of the device. In this paper we present a method for establishing and securing spontaneous interactions on the basis of spatial references that capture the spatial relationship of the involved devices. Spatial references are obtained by accurate sensing of relative device positions, presented to the user for initiation of interactions, and used in a peer authentication protocol that exploits a novel mechanism for message transfer over ultrasound to ensures spatial authenticity of the sender.