咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Secure Pairing with Wearable D... 收藏

Secure Pairing with Wearable Devices by Using Ambient Sound and Light

Secure Pairing with Wearable Devices by Using Ambient Sound and Light

作     者:LIU Dong CHEN Jing DENG Qisi Arouna KONATE TIAN Zairong 

作者机构:State Key Laboratory of Software Engineering / School ofComputer Wuhan University Wuhan 430072 Hubei China Beijing Guangyude Vision Tech Co. Ltd Beijing 100118China 

出 版 物:《Wuhan University Journal of Natural Sciences》 (武汉大学学报(自然科学英文版))

年 卷 期:2017年第22卷第4期

页      面:329-336页

核心收录:

学科分类:08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Supported by the National Natural Science Foundation of China(61272451 61572380) 

主  题:device pairing context comparison wearable devices 

摘      要:Wearable devices usually work together with smart *** ensure only legitimate smart phones can read the data,they must conduct pairing to establish a shared *** pairing methods require that the pairing devices have a keyboard or screen for user ***,due to the size limitation,keyboards or screens are hard to be installed in the wearable *** solve this problem,we propose a novel pairing method by using ambient sound and *** this new scheme,any pairing request from smart phone will trigger wearable device *** after users press the confirm key on the device can the pairing process *** pairing devices collect ambient sound and light at the predetermined time and establish a shared key by using the Diffie-Hellman *** protect against potential man-in-the-middle attacks in the key establishment process,an improved interlock protocol with sound and light comparison is conducted to authenticate the *** both the sound and light collected by the pairing devices are similar enough,the key is ***,it is *** with current context based pairing methods,our scheme does not impose strict synchronization on devices to collect ambient context ***,our scheme need not collect and exchange contextual information for multiple times to resist offline brute force *** experimental results and security analysis prove the effectiveness of our scheme.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分