Please use this identifier to cite or link to this item:
|Title:||Using audio in secure device pairing||Authors:||Goodrich, Michael
|Major Field of Science:||Natural Sciences||Field Category:||Computer and Information Sciences||Keywords:||Audio;Human-assisted authentication;Man-in-the-middle attacks;MITM;Personal device;Secure device pairing||Issue Date:||2009||Source:||International Journal of Security and Networks, 2009, vol. 4, no. 1-2, pp. 57-68||Volume:||4||Issue:||1-2||Start page:||57||End page:||68||Journal:||International Journal of Security and Networks||Abstract:||Secure pairing of electronic devices is an important issue that must be addressed in many contexts. In the absence of prior security context, the need to involve the user in the pairing process is a prominent challenge. In this paper, we investigate the use of the audio channel for human-assisted device pairing. First we assume a common (insecure) wireless channel between devices. We then obviate the assumption of a pre-existing common channel with a single-channel device pairing approach only based on audio. Both approaches are applicable to a wide range of devices and place light burden on the user||URI:||http://ktisis.cut.ac.cy/handle/10488/7188||ISSN:||1747-8413||DOI:||10.1504/IJSN.2009.023426||Rights:||© Inderscience Enterprises||Type:||Article||Affiliation:||University of California||Affiliation :||University of California|
|Appears in Collections:||Άρθρα/Articles|
checked on Aug 31, 2020
Page view(s) 20162
checked on Oct 28, 2020
Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.