Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report tiger
Active In SP
**

Posts: 1,062
Joined: Feb 2010
#1
10-02-2010, 11:09 PM


A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are both intuitive and secure. Simultaneous shaking is proposed as a novel and easy-to-use mechanism for pairing of small mobile devices. The underlying principle is to use common movement as a secret that the involved devices share for mutual authentication. We present two concrete methods, ShaVe and ShaCK, in which sensing and analysis of shaking movement is combined with cryptographic protocols for secure authentication. ShaVe is based on initial key exchange followed by exchange and comparison of sensor data for verification of key authenticity. ShaCK, in contrast, is based on matching features extracted from the sensor data to construct a cryptographic key. The classification algorithms used in our approach are shown to robustly separate simultaneous shaking of two devices from other concurrent movement of a pair of devices, with a false negative rate of under 12 percent. A user study confirms that the method is intuitive and easy to use, as users can shake devices in an arbitrary pattern.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  intel centrino mobile technology ppt jaseelati 0 271 05-01-2015, 04:49 PM
Last Post: jaseelati
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,747 09-12-2014, 09:25 PM
Last Post: Guest
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 721 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  ON THE EFFECTIVENESS OF MONITORING FOR INTRUSION DETECTION IN MOBILE AD HOC abstract seminar tips 2 802 09-05-2014, 09:43 AM
Last Post: seminar project topic
  Online Mobile Phone Shop seminar class 15 12,048 22-10-2013, 07:51 PM
Last Post: vishalonne
  The Use of Interval-Related Expert Knowledge in Processing 2-D and 3-D Data seminar projects maker 0 330 26-09-2013, 02:13 PM
Last Post: seminar projects maker
  Privacy-Conscious Location-Based Queries in Mobile Environments pdf seminar projects maker 0 400 24-09-2013, 03:35 PM
Last Post: seminar projects maker
  Network Assisted Mobile Computing with Optimal Uplink Query Processing pdf seminar projects maker 0 467 20-09-2013, 04:01 PM
Last Post: seminar projects maker
  Energy Optimization Mechanism for Mobile Terminals using Vertical Handoff pdf study tips 0 303 07-09-2013, 02:10 PM
Last Post: study tips
  THREE DIMENSIONAL PASSWORD FOR MORE SECURE AUTHENTICATION A MAIN PROJECT REPORT study tips 0 429 29-08-2013, 02:15 PM
Last Post: study tips