Proving co-location by context comparison Seminar Report
نویسنده
چکیده
Due to practical demands, usability in security systems is reconsidered by researchers in recent years. Given the three prevailing short range communication technologies Radio Frequency Identification (RFID), Near Field Communication (NFC) and Bluetooth, Zero-Interaction Authentication (ZIA) is proposed for a subset of their application scenarios. Nevertheless, relay attacks especially ”ghost-and-leech” have emerged as threats against ZIA model. In this paper, we will present the co-location-based solution to defense ZIA against relay attacks. The idea is to verify the co-location of two principals involved in authentication by comparing their contextual features. The contextual features (known as context tags) are extracted and synthesized from the sensing data of related contextual attributes . We will present 6 categories of context tags (audio, light, GPS, acceleration, wireless broadcast traffic, and nearby deviceIDs) with principles, proof-of concept experiments and specific application scenarios. We will also evaluate the advantages and limitations of each context tag, and discuss probable problems for our solution. Finally, we will introduce our experiment on BlueProximity, a Bluetooth computer lock application, in order to demonstrate the probable attacks and the feasibility of contextual co-location-based authentication.
منابع مشابه
Information from Deduction: Models and Proofs
This report documents the program and the outcomes of Dagstuhl Seminar 15381 “Information from Deduction: Models and Proofs”. The aim of the seminar was to bring together researchers working in deduction and applications that rely on models and proofs produced by deduction tools. Proofs and models serve two main purposes: (1) as an upcoming paradigm towards the next generation of automated dedu...
متن کاملDecision Procedures in Soft, Hard and Bio-ware - Follow Up (Dagstuhl Seminar 11272)
This report documents the program and the outcomes of Dagstuhl Seminar 11272 Decision Procedures in Soft, Hard and Bio-ware (Follow Up). It was held as a follow-on for a seminar 10161, of the same title, that took place in late April 2010 during the initial eruption of Eyjafjallajökull. In spite of the travel disruptions caused by the eruption of the volcano, the original seminar received a res...
متن کاملDagstuhl Seminar 01141, 2–6 April, 2001 Semantic Foundations of Proof-search
We present a brief report on Dagstuhl Seminar 01141, “Semantic Foundations of Proof-search”, held 2–6 April, 2001. We begin, in § 2, with the usual description of the seminar, as required by the Dagstuhl administration. Then, in § 3, we provide a brief account of the seminar itself, discussing the main themes emerging from the lectures and the associated conversations. In § 4 we give the progra...
متن کاملProving the efficiency of pro-2-groups of fixed co-classes
Among the six classes of pro-2-groups of finite and fixed co-classes and trivial Schur Multiplicator which studied by Abdolzadeh and Eick in 2009, there are two classes $$S_5=langle a,bmid [b,a^2]=1, a^2=[b,a]^2, (b^2)^{[b,a]}b^2=1rangle$$ and $$S_6=langle a,t,bmid a^2=b^2,[b,a]^2=1, t^a=t^{-1}[b,a], b^t=abarangle$$that have been conjectured to have deficiency zero presentations. In this paper ...
متن کاملReport from Dagstuhl Seminar 15181 Challenges and Trends in Probabilistic Programming
This report documents the program and the outcomes of Dagstuhl Seminar 15181 “Challenges and Trends in Probabilistic Programming”. Probabilistic programming is at the heart of machine learning for describing distribution functions; Bayesian inference is pivotal in their analysis. Probabilistic programs are used in security for describing both cryptographic constructions (such as randomised encr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013