Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computing systems due to the ad-hoc and spontaneous nature of interactions among devices. These systems are prone to security risks, such as eavesdropping and require different techniques as compared to traditional security mechanisms. Recently, secure device pairing in wireless environments has got substantial attention from many researchers. As a result, a significant set of techniques and protocols have been proposed to deal with this issue. Some of these techniques consider devices equipped with infrared, laser, ultrasound transceivers or 802.11 network interface cards; while others require embedded accelerometers, cameras and/or LEDs, displays, microphones and/or speakers. However, many of the proposed techniques or protocols have not been implemented at all; while others are implemented and evaluated in a stand-alone manner without being compared with other related work [1]. We believe that it is because of the lack of specialized tools that provide a common platform to test the pairing methods. As a consequence, we designed such a tool. In this paper, we are presenting design and development of the Pairing Simulator (PSim) that can be used to perform the analysis of device pairing methods.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
- The document summarizes a study that evaluated the security of wireless networks in Jordan through a process called "wardriving" where the researchers drove around with wireless network detection tools.
- The results found that the majority (79.52%) of wireless networks tested were unsecured and vulnerable. Most networks used either low levels of encryption (68.67%) or no encryption at all (11.45%).
- Nearly all networks broadcast the default SSID (92.17%), leaving them exposed to potential hackers since changing the SSID is a basic security precaution.
This document provides the questions and answers to an exam on CCNA 1 Chapter 1. It tests knowledge of networking fundamentals like different types of Internet connections, functions of intermediary devices, definitions of basic networking terms, security goals, and factors considered when selecting network media. The exam also covers concepts like cloud computing, characteristics of circuit-switched networks, tools that enable remote meetings, and the relationship between LANs and WANs.
Due to an explosion of demand for high speed wireless
services such as wireless internet,email,stock quotes and cellular
video conferencing wireless communication has become one of the
important field in modern engineering.Wireless networks are broadly
classified into four different kinds such as wireless lans,satellite
networks,cellular networks and personal networks. In most of the
scenarios WLAN’s systems are based on single hop operation but in
now a day’s significant study has been done on WLAN’s with multihop
operation.In this research article we have studied the various
security issues of wlan especially with respect to bluetooth.wireless
local area networks are different from Wired networks in terms of
cost,security,high reliability,resource
sharing,scalability,communication media etc. One of the important
problem for wireless network is limited frequency spectrum. In now
a day’s wireless local area network consists of multiple stations that
coexist with in a limited geographic jurisdiction and share a common
wireless channel to communicate with each other.This research work
proposes a mathematical model based security issues of wlan by
investigating,design,implementation and performance analysis using
Digital Signal Processing(DSP) Space Time Processing.Space time
processing technology which uses more than one antennas
with an appropriate signaling and receiver methodology
provides a powerful tool for improving the performance of
WLAN’s.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRALEman Kanjo
ViralNet is a proposed wireless network concept that allows messages and sensor readings to spread in a viral manner between nearby mobile devices using short-range wireless protocols like Bluetooth. It aims to extend the range of communication beyond typical Bluetooth and WiFi limits to disseminate information to larger crowds. The system operates in a fully distributed manner without centralized infrastructure. Messages are opportunistically transferred between devices within range and can hop from one device to another to reach more people. This could enable new applications for emergency notifications, crowd monitoring, and citizen reporting without an internet connection.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
The document summarizes a presentation on research challenges in networked systems. It discusses recommendations from an evaluation of ICT research in Norway, including better aligning research with industry needs. It also looks at past research topics from 2000 and potential future areas like cloud computing, cyber-physical systems, smart grids, and security. The presentation concludes that security issues will remain important and that energy efficiency is a grand challenge, requiring interdisciplinary collaboration to address complexity.
This document certifies that four students - Sumon Paul, MD. Arifur Rahman, MD. Jakir Hossain, and MD. Ariful Huq - from Stamford University successfully completed their honors project on "Implementation of WLAN Project" under the supervision of Tanbir Ibne Anower. The project focused on analyzing the technology within wireless networking and its characteristics.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
- The document summarizes a study that evaluated the security of wireless networks in Jordan through a process called "wardriving" where the researchers drove around with wireless network detection tools.
- The results found that the majority (79.52%) of wireless networks tested were unsecured and vulnerable. Most networks used either low levels of encryption (68.67%) or no encryption at all (11.45%).
- Nearly all networks broadcast the default SSID (92.17%), leaving them exposed to potential hackers since changing the SSID is a basic security precaution.
This document provides the questions and answers to an exam on CCNA 1 Chapter 1. It tests knowledge of networking fundamentals like different types of Internet connections, functions of intermediary devices, definitions of basic networking terms, security goals, and factors considered when selecting network media. The exam also covers concepts like cloud computing, characteristics of circuit-switched networks, tools that enable remote meetings, and the relationship between LANs and WANs.
Due to an explosion of demand for high speed wireless
services such as wireless internet,email,stock quotes and cellular
video conferencing wireless communication has become one of the
important field in modern engineering.Wireless networks are broadly
classified into four different kinds such as wireless lans,satellite
networks,cellular networks and personal networks. In most of the
scenarios WLAN’s systems are based on single hop operation but in
now a day’s significant study has been done on WLAN’s with multihop
operation.In this research article we have studied the various
security issues of wlan especially with respect to bluetooth.wireless
local area networks are different from Wired networks in terms of
cost,security,high reliability,resource
sharing,scalability,communication media etc. One of the important
problem for wireless network is limited frequency spectrum. In now
a day’s wireless local area network consists of multiple stations that
coexist with in a limited geographic jurisdiction and share a common
wireless channel to communicate with each other.This research work
proposes a mathematical model based security issues of wlan by
investigating,design,implementation and performance analysis using
Digital Signal Processing(DSP) Space Time Processing.Space time
processing technology which uses more than one antennas
with an appropriate signaling and receiver methodology
provides a powerful tool for improving the performance of
WLAN’s.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
VIRALNET: A WAY TO MAKE SHORT-RANGE MESSAGES INSTANTLY VIRALEman Kanjo
ViralNet is a proposed wireless network concept that allows messages and sensor readings to spread in a viral manner between nearby mobile devices using short-range wireless protocols like Bluetooth. It aims to extend the range of communication beyond typical Bluetooth and WiFi limits to disseminate information to larger crowds. The system operates in a fully distributed manner without centralized infrastructure. Messages are opportunistically transferred between devices within range and can hop from one device to another to reach more people. This could enable new applications for emergency notifications, crowd monitoring, and citizen reporting without an internet connection.
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.
The document summarizes a presentation on research challenges in networked systems. It discusses recommendations from an evaluation of ICT research in Norway, including better aligning research with industry needs. It also looks at past research topics from 2000 and potential future areas like cloud computing, cyber-physical systems, smart grids, and security. The presentation concludes that security issues will remain important and that energy efficiency is a grand challenge, requiring interdisciplinary collaboration to address complexity.
This document certifies that four students - Sumon Paul, MD. Arifur Rahman, MD. Jakir Hossain, and MD. Ariful Huq - from Stamford University successfully completed their honors project on "Implementation of WLAN Project" under the supervision of Tanbir Ibne Anower. The project focused on analyzing the technology within wireless networking and its characteristics.
IRJET - Security and Privacy by IDS SystemIRJET Journal
This document summarizes a research paper that proposes an intrusion detection system (IDS) to detect spoofing attacks in wireless sensor networks. The IDS monitors node activities and detects if a node is behaving abnormally or attacking the network. If an attack is detected, the IDS sends an alarm message to the affected node to isolate the attacker. The paper simulates this approach using OTCL language in Network Simulator 2 on Linux. The results show the IDS can efficiently detect spoofing attackers in the wireless network.
Bluetooth is a wireless communication technology to build small networks of devices. It was designed as a cable replacement technology. Given its widespread adoption, especially in mobile devices, new uses are possible today. For instance, one can broadcast messages to nomadic users based on their location. In this paper, we perform an experimental evaluation of whether Bluetooth is indeed a suitable technology for spontaneous networking and broadcasting. The evaluation does not only consist of a review of current hardware and software, but also of a concrete implementation tested in a controlled indoor and in a not-controlled outdoor environment. The results of the experimentation show that, despite the intrinsic limitation of the original design, Bluetooth is indeed suitable for mobile location-based broadcasting. S. Atchaya | S. Deepika | S. Selvanayaki "Bluetooth Broadcasting" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18464.pdf
This document discusses mobile ad hoc networks (MANETs), which are autonomous wireless networks formed by mobile devices without a fixed infrastructure. It provides an overview of potential MANET applications for emergency situations, enterprise, education, and more. The document also outlines several challenges for MANETs, including routing, service discovery, security, and dealing with the network's dynamic topology without a centralized administration.
This document provides an overview of IEEE standards for mobile ad hoc networks (MANETs). It discusses the evolution of MANETs and the key characteristics including dynamic topologies and limited bandwidth. The document describes the MANET architecture including enabling technologies, networking layers, and applications/middleware. It then focuses on explaining the IEEE 802.11 standards for wireless local area networks, comparing 802.11a, 802.11b, and 802.11g in terms of channels, data rates, frequencies/modulation, range/density, and compatibility. The purpose is to survey the IEEE standards that help enable ad hoc networking capabilities.
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
The document discusses the potential for wireless body area networks (WBANs) and smart cards to impact health, social, and life sciences. It describes a 3-tier WBAN system for ubiquitous health monitoring and opportunities for computer-assisted rehabilitation and personalized healthcare. Key challenges include sensor size and power consumption, safety, security, and privacy. The document also outlines potential smart card applications for social networking and collaboration at conferences.
This document contains questions and answers about networking concepts. It covers topics like internet connectivity types, network functions, security goals, and characteristics of networks. For example, it states that cable and DSL provide always-on high-bandwidth internet connections, and that routers determine the path that messages take through internetworks. It also addresses concepts like BYOD, cloud computing, and wireless LAN redesign due to increased use of personal devices on networks.
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Đồng Quốc Vương
This document contains 21 multiple choice questions and answers from the CCNA 1 Chapter 1 v5.0 exam. The questions cover topics like internet connection types, network devices, security goals, and network congestion. Answers are provided for each question about concepts addressed in the CCNA curriculum.
Dynamic trust management for delay tolerant networks and its application to s...Papitha Velumani
This document discusses a proposed dynamic trust management protocol for delay tolerant networks (DTNs) to deal with both malicious and selfish nodes. The protocol aims to optimize routing performance in DTNs in response to changing network conditions and types of misbehaving nodes. Simulation results show that the trust-based routing protocol can improve delivery ratio compared to other protocols while balancing message overhead and delay. It also demonstrates resilience against trust-related attacks from malicious nodes.
This document summarizes a student's paper on using reinforcement learning for anomaly detection in software defined networks. The student aims to use machine learning techniques, specifically reinforcement learning, to make network traffic control decisions given certain network attack scenarios. The student's methodology involves using network statistics collected from an OpenFlow switch to define states for a reinforcement learning algorithm. The algorithm is deployed on the application plane of an SDN architecture and aims to identify anomalous traffic flows based on features like flow size and packet counts, then take actions through the controller to stop anomalous traffic from affecting the network. Initial testing of the approach showed potential for detecting ping flood and SYN flood attacks on the simulated network.
Wireless lan intrusion detection by using statistical timing approacheSAT Journals
Abstract Today as we all are habitual of using internet through wired or wireless LAN Networks, but using internet through Wireless LAN becomes harder as the threat of unauthorized access point is increasing day by day. In This paper we are focusing on different types of rogue access points (APs) that are masquerading and attracting people to get associate with them or to connect with them. We are implementing a solution to avoid people or users from connecting to the unauthorized access point by using experimental time dependent scheme. Our detection technique is a client-oriented method that uses the complete tour time between the DNS server and user that perfectly determine that whether an access point with which the user has connected is the legitimate access point or a unauthorized access point. In this paper we are implementing concept using .Net framework and sql server, Which gives us the characteristics like robust, accuracy and effectiveness for detecting rogue or unauthorized access point without getting any help from WLAN administrator. In this simulation technique we will get accurate values so that we can distinguish between rogue access point and legitimate access point Keywords— WLAN, APs, RAP, LAN
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
This document discusses third-party emergency alert systems that send SMS messages and their security limitations. It proposes a system where when an accident occurs, a software on the mobile phone of the affected person would automatically send a message without them having to type it. This message would be received by a service center using a GSM modem which could then identify the accident location using the mobile number and tower location. The appropriate emergency services like police and fire department would be informed to reduce response times. The document also discusses related work on denial of service attacks, SMS network architecture and address filtering.
Comcast Technology Fund - US Ignite Application Summit 2013US-Ignite
The document summarizes the different types of grants offered through Comcast's Tech Research & Development Grants Fund, including general research grants, targeted research grants, and targeted open source development grants. It also lists topics of interest that will be considered for funding, such as networking, video technology, voice technology, cloud computing, security, and new services. Finally, it provides information on the timing of grant announcements and applications.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user’s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this research work is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. The contributions presented in this paper include the design and prototype implementation of the proposed framework along with a novel Co-Location protocol.
The document provides an overview of a torts outline covering topics such as the definition of a tort, purposes of tort law, intentional torts including intent and battery, and definitions related to battery. Key points include that a tort is a civil wrong other than breach of contract, purposes of tort law include deterring wrongful conduct and restoring injured parties, intent requires voluntary acts to cause harm or knowledge that harm will likely result, and battery requires intentional harmful or offensive contact without consent.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
IRJET - Security and Privacy by IDS SystemIRJET Journal
This document summarizes a research paper that proposes an intrusion detection system (IDS) to detect spoofing attacks in wireless sensor networks. The IDS monitors node activities and detects if a node is behaving abnormally or attacking the network. If an attack is detected, the IDS sends an alarm message to the affected node to isolate the attacker. The paper simulates this approach using OTCL language in Network Simulator 2 on Linux. The results show the IDS can efficiently detect spoofing attackers in the wireless network.
Bluetooth is a wireless communication technology to build small networks of devices. It was designed as a cable replacement technology. Given its widespread adoption, especially in mobile devices, new uses are possible today. For instance, one can broadcast messages to nomadic users based on their location. In this paper, we perform an experimental evaluation of whether Bluetooth is indeed a suitable technology for spontaneous networking and broadcasting. The evaluation does not only consist of a review of current hardware and software, but also of a concrete implementation tested in a controlled indoor and in a not-controlled outdoor environment. The results of the experimentation show that, despite the intrinsic limitation of the original design, Bluetooth is indeed suitable for mobile location-based broadcasting. S. Atchaya | S. Deepika | S. Selvanayaki "Bluetooth Broadcasting" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18464.pdf
This document discusses mobile ad hoc networks (MANETs), which are autonomous wireless networks formed by mobile devices without a fixed infrastructure. It provides an overview of potential MANET applications for emergency situations, enterprise, education, and more. The document also outlines several challenges for MANETs, including routing, service discovery, security, and dealing with the network's dynamic topology without a centralized administration.
This document provides an overview of IEEE standards for mobile ad hoc networks (MANETs). It discusses the evolution of MANETs and the key characteristics including dynamic topologies and limited bandwidth. The document describes the MANET architecture including enabling technologies, networking layers, and applications/middleware. It then focuses on explaining the IEEE 802.11 standards for wireless local area networks, comparing 802.11a, 802.11b, and 802.11g in terms of channels, data rates, frequencies/modulation, range/density, and compatibility. The purpose is to survey the IEEE standards that help enable ad hoc networking capabilities.
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
The document discusses the potential for wireless body area networks (WBANs) and smart cards to impact health, social, and life sciences. It describes a 3-tier WBAN system for ubiquitous health monitoring and opportunities for computer-assisted rehabilitation and personalized healthcare. Key challenges include sensor size and power consumption, safety, security, and privacy. The document also outlines potential smart card applications for social networking and collaboration at conferences.
This document contains questions and answers about networking concepts. It covers topics like internet connectivity types, network functions, security goals, and characteristics of networks. For example, it states that cable and DSL provide always-on high-bandwidth internet connections, and that routers determine the path that messages take through internetworks. It also addresses concepts like BYOD, cloud computing, and wireless LAN redesign due to increased use of personal devices on networks.
Delay Tolerant Networks (DTNs) have high end-to-end latency, which is often faces disconnection, and unreliable wireless connections. It does not mean a delay service instead DTNs provides a service where network imposes disruption or delay. It operates in challenged networks with extremely limited resources such as memory size, CPU processing power etc. This paper presents an efficient trust managing mechanism for providing secure environment. The proposed dynamic trust management protocol uses a dynamic threshold updating which overcomes the problems with time changing dynamic characteristics by dynamically updating the criteria in response to changing network conditions. This reduces overheads and increases the efficient use of routing network even in conditions change. Also the dynamic threshold update reduces the false detection probability of the malicious nodes. To show the effectiveness of the proposed system, a detailed simulation in the presence of selfish and malicious nodes is performed with ONE simulator. Finally a comparative analysis of our proposed routing with previous routing protocols is also performed. The results demonstrate that presented algorithm deals effectively with selfish behavior with providing significant gain on effective delivery ratio in trade off with message overhead and delay
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Đồng Quốc Vương
This document contains 21 multiple choice questions and answers from the CCNA 1 Chapter 1 v5.0 exam. The questions cover topics like internet connection types, network devices, security goals, and network congestion. Answers are provided for each question about concepts addressed in the CCNA curriculum.
Dynamic trust management for delay tolerant networks and its application to s...Papitha Velumani
This document discusses a proposed dynamic trust management protocol for delay tolerant networks (DTNs) to deal with both malicious and selfish nodes. The protocol aims to optimize routing performance in DTNs in response to changing network conditions and types of misbehaving nodes. Simulation results show that the trust-based routing protocol can improve delivery ratio compared to other protocols while balancing message overhead and delay. It also demonstrates resilience against trust-related attacks from malicious nodes.
This document summarizes a student's paper on using reinforcement learning for anomaly detection in software defined networks. The student aims to use machine learning techniques, specifically reinforcement learning, to make network traffic control decisions given certain network attack scenarios. The student's methodology involves using network statistics collected from an OpenFlow switch to define states for a reinforcement learning algorithm. The algorithm is deployed on the application plane of an SDN architecture and aims to identify anomalous traffic flows based on features like flow size and packet counts, then take actions through the controller to stop anomalous traffic from affecting the network. Initial testing of the approach showed potential for detecting ping flood and SYN flood attacks on the simulated network.
Wireless lan intrusion detection by using statistical timing approacheSAT Journals
Abstract Today as we all are habitual of using internet through wired or wireless LAN Networks, but using internet through Wireless LAN becomes harder as the threat of unauthorized access point is increasing day by day. In This paper we are focusing on different types of rogue access points (APs) that are masquerading and attracting people to get associate with them or to connect with them. We are implementing a solution to avoid people or users from connecting to the unauthorized access point by using experimental time dependent scheme. Our detection technique is a client-oriented method that uses the complete tour time between the DNS server and user that perfectly determine that whether an access point with which the user has connected is the legitimate access point or a unauthorized access point. In this paper we are implementing concept using .Net framework and sql server, Which gives us the characteristics like robust, accuracy and effectiveness for detecting rogue or unauthorized access point without getting any help from WLAN administrator. In this simulation technique we will get accurate values so that we can distinguish between rogue access point and legitimate access point Keywords— WLAN, APs, RAP, LAN
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
This document discusses third-party emergency alert systems that send SMS messages and their security limitations. It proposes a system where when an accident occurs, a software on the mobile phone of the affected person would automatically send a message without them having to type it. This message would be received by a service center using a GSM modem which could then identify the accident location using the mobile number and tower location. The appropriate emergency services like police and fire department would be informed to reduce response times. The document also discusses related work on denial of service attacks, SMS network architecture and address filtering.
Comcast Technology Fund - US Ignite Application Summit 2013US-Ignite
The document summarizes the different types of grants offered through Comcast's Tech Research & Development Grants Fund, including general research grants, targeted research grants, and targeted open source development grants. It also lists topics of interest that will be considered for funding, such as networking, video technology, voice technology, cloud computing, security, and new services. Finally, it provides information on the timing of grant announcements and applications.
AN EXPANDED BLUETOOTH NETWORK-A SOLUTION TO THE SHORT RANGE BLUETOOTH COMMUNI...cscpconf
Bluetooth is a short range, low power, low cost wireless communication technology designed to connect phones, laptops and PDAs. The greater availability of portable devices with Bluetooth connectivity imposes wireless connection between enabled devices. This paper considers the problems of Bluetooth communication and also proposes a new expanded network to overcome the basic limitation of Bluetooth devices that is the range constraint. This creates a network of devices that will include laptops, set top devices and also mobile phones. The main purpose of this proposal is to establish a network will enable the users to communicate outside the range without any range constraint.
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user’s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this research work is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. The contributions presented in this paper include the design and prototype implementation of the proposed framework along with a novel Co-Location protocol.
The document provides an overview of a torts outline covering topics such as the definition of a tort, purposes of tort law, intentional torts including intent and battery, and definitions related to battery. Key points include that a tort is a civil wrong other than breach of contract, purposes of tort law include deterring wrongful conduct and restoring injured parties, intent requires voluntary acts to cause harm or knowledge that harm will likely result, and battery requires intentional harmful or offensive contact without consent.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Secure and distributed data discovery and dissemination in wireless sensor ne...Pvrtechnologies Nellore
This document proposes a secure and distributed data discovery and dissemination protocol for wireless sensor networks called DiDrip. It addresses limitations of existing centralized protocols by allowing multiple authorized users and network owners to directly disseminate data items to sensor nodes. DiDrip provides authenticity and integrity of data items through digital signatures combined with efficient data structures. It aims to be scalable, resilient to node compromise and user collusion, and impose low overhead on resource-limited sensor nodes. The paper analyzes the security properties of DiDrip and implements it on an experimental sensor network to demonstrate its efficiency in practice.
This document discusses the development of a novel pattern detection processor using an adaptively divisible dual-port BiTCAM (binary ternary content-addressable memory) to achieve high-throughput, low-power and low-cost pattern detection for mobile devices. The proposed dual-port BiTCAM architecture uses a dual-port AND-type match-line scheme with dual-port active AND gates. This allows for shared storage spaces to reduce power consumption through improved storage efficiency. The divisible BiTCAM also provides flexibility to regularly update the virus database.
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
This document discusses using public-key cryptography for data security in wireless sensor networks. It begins with an abstract that introduces public-key infrastructure for sensor networks to allow services like digital signatures. It then provides background on wireless sensor networks and discusses their limitations, including limited resources and vulnerability of nodes. It reviews different techniques for distributing public keys, including public announcement, publicly available directories, using a public-key authority, and public-key certificates. It analyzes whether a public-key infrastructure is feasible for sensor networks given their constraints. The document concludes by discussing potential public-key schemes that could work for wireless sensor networks.
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYcscpconf
Internet middleboxes such as VPNs, firewalls, and proxies can significantly change handling of traffic streams. They play an increasingly important role in various types of IP networks. If end hosts can detect them, these hosts can make beneficial, and in some cases, crucial improvements in security and performance But because middle boxes have widely varying behavior and effects on the traffic they handle, no single technique has been discovered that can detect all of them.
Devising a detection mechanism to detect any particular type of middle box interference involves many design decisions and has numerous dimensions. One approach to assist with the
complexity of this process is to provide a set of systematic guidelines. This paper is the first attempt to introduce a set of general guidelines (as well as the rationale behind them) to assist researchers with devising methodologies for end-hosts to detect middle boxes by the end-hosts. The guidelines presented here take some inspiration from the previous work of other
researchers using various and often ad hoc approaches. These guidelines, however, are mainly based on our own experience with research on the detection of middle boxes. To assist
researchers in using these guidelines, we also provide an example of how to bring them into play for detection of network compression.
How to detect middleboxes guidelines on a methodologycsandit
Internet middleboxes such as VPNs, firewalls, and proxies can significantly change handling of
traffic streams. They play an increasingly important role in various types of IP networks. If end
hosts can detect them, these hosts can make beneficial, and in some cases, crucial improvements
in security and performance But because middleboxes have widely varying behavior and effects
on the traffic they handle, no single technique has been discovered that can detect all of them.
Devising a detection mechanism to detect any particular type of middlebox interference involves
many design decisions and has numerous dimensions. One approach to assist with the
complexity of this process is to provide a set of systematic guidelines. This paper is the first
attempt to introduce a set of general guidelines (as well as the rationale behind them) to assist
researchers with devising methodologies for end-hosts to detect middleboxes by the end-hosts.
The guidelines presented here take some inspiration from the previous work of other
researchers using various and often ad hoc approaches. These guidelines, however, are mainly
based on our own experience with research on the detection of middleboxes. To assist
researchers in using these guidelines, we also provide an example of how to bring them into
play for detection of network compression
Bluetooth is a wireless technology that allows short-range connections between electronic devices like computers, phones, and other portable devices. It uses radio waves instead of wires to connect devices within about 30 feet of each other, eliminating the need for direct line-of-sight connections. A group of companies formed the Bluetooth Special Interest Group to develop the Bluetooth specifications and promote its use. While initially developed for business users, Bluetooth's ability to connect diverse devices wirelessly has led to its use in many consumer products as well.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
LIGHT AND SECURE COMMUNICATION ALGORITHM FOR COGNITIVE RADIO NETWORK BY USING...Raja Larik
This document discusses secure communication algorithms for cognitive radio networks. It proposes using a labyrinthine authentication formula, which combines spread spectrum modulation, encryption algorithms, and the ability to switch between different frequency bands. This allows cognitive radio networks to provide secure communication that is resistant to eavesdropping and interference. The document also analyzes threats like physical sensor manipulation and belief manipulation that could impact a cognitive radio's behavior. It argues that combining cognitive radio with spread spectrum modulation techniques and encryption algorithms can create a secure communication system impervious to narrowband jamming and other attacks.
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Security Models in Cellular Wireless NetworksWilliam Chipman
- Wireless networks and cellular networks are increasingly used for sensitive data transfer, raising security concerns.
- There are four main approaches to cellular network security: authentication, authorization, encryption, and physical security. Newer approaches include sandboxing on smartphones.
- As cellular and wireless networks continue integrating, new security risks emerge that require comprehensive security models across both network types.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
Similar to PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS (20)
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
PSIM: A TOOL FOR ANALYSIS OF DEVICE PAIRING METHODS
1. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
PSIM: A TOOL FOR ANALYSIS OF
DEVICE PAIRING METHODS
Yasir Arfat Malkani and Lachhman Das Dhomeja
Department of Informatics, University of Sussex, Brighton, UK
{y.a.malkani, l.d.dhomeja}@sussex.ac.uk
ABSTRACT
Wireless networks are a common place nowadays and almost all of the modern devices support wireless
communication in some form. These networks differ from more traditional computing systems due to
the ad-hoc and spontaneous nature of interactions among devices. These systems are prone to security
risks, such as eavesdropping and require different techniques as compared to traditional security
mechanisms. Recently, secure device pairing in wireless environments has got substantial
attention from many researchers. As a result, a significant set of techniques and protocols have been
proposed to deal with this issue. Some of these techniques consider devices equipped with
infrared, laser, ultrasound transceivers or 802.11 network interface cards; while others require
embedded accelerometers, cameras and/or LEDs, displays, microphones and/or speakers. However,
many of the proposed techniques or protocols have not been implemented at all; while others are
implemented and evaluated in a stand-alone manner without being compared with other related work [1].
We believe that it is because of the lack of specialized tools that provide a common platform to test the
pairing methods. As a consequence, we designed such a tool. In this paper, we are presenting design
and development of the Pairing Simulator (PSim) that can be used to perform the analysis of device
pairing methods.
KEYWORDS
Security, Usability, Device Association, Simulation, Standard
Measures
1. INTRODUCTION
More and more computing devices are coming into existence everyday, which may vary in size,
capabilities, mode of interaction and so on. As a result, we are moving towards a world in which
computing is omnipresent. Most of the modern devices support multiple communication
channels and almost all of them use wireless technology in some form, such as Bluetooth,
Infrared, Wibree, Zigbee, Ultrasound or 802.11 Having wireless technology in these devices
does not guarantee that all of these devices can also take advantage of internet technology.
However, those wireless enabled devices that can not be connected to internet, can still take
advantage of other co-located devices in the vicinity by forming short-term or long-term
associations on ad hoc basis. For example pairing a Bluetooth enabled headset with a mobile
phone or MP3 player (short-term) and pairing of a PDA with home devices in order to control
them wirelessly (long-term).
Since wireless communication is susceptible to eavesdropping, thus one can easily launch well
known man-in-the-middle (MITM) attack, Denial-of-Service (DoS) attack or can perform
bidding-down attack to fail the secure pairing process. The solution to this problem is
establishing a secure channel between the pairing devices by some kind of mechanisms, such as
authentication and encryption. Establishing a secure channel is trivial, when there existed an
off-line or on-line global infrastructure, such as PKI. However, such a global infrastructure is
hard to implement in mobile ad hoc and ubiquitous computing environments that makes it a
39
2. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
challenging real-world problem. Due to the ad hoc and dynamic nature of these environments,
devices do not know each other a priori, so the idea of pre-shared secret key is failed. Further,
traditional key exchange or key agreement approaches, such as Diffie-Hellman [2]– in their
actual form – are not applicable in wireless environments due to their vulnerability to MiTM
attack. Moreover, devices’ heterogeneity in terms of their communication channels, user
interfaces, power requirements and sensing technology, make it hard to give a single solution
for secure pairing of devices. As a result, wide community of researchers has proposed a large
set of protocols and techniques to deal with this issue. However, these protocols vary in the
strength of their security, their susceptibility to environmental conditions and in the required
physical capabilities of the devices. Currently, there may existed many options for an ordinary
user to establish a secure channel between the devices from entering pins and passwords to
verifying hashes of public keys and pressing buttons simultaneously on the two devices. In this
paper, we are presenting the design, development and evaluation of a simulation tool for pairing
methods followed by a brief discussion on existing pairing methods.
Remaining part of this paper is organized as follows: section 2 is background that describes
various existing device pairing methods, section 3 presents the design and development of the
simulator, section 4 discusses a case study that is carried out to evaluate the simulator, and
finally section 5 concludes the paper.
2. BACKGROUND
The problem of secure device association (pairing) continues to be a very active area of research
in wireless environments. The issue got significant attention from many researchers, after
Stajano et al. [3-4] highlighted the challenges inherent in secure device association. They
proposed a mother-duckling (master-slave) model, which maps the relationship between
devices. The pairing process is done by agreeing on a secret key over the physical connection
(such as using a cable). Though the secret key is transferred in plain-text and cryptographic
methods are not used, it is susceptible to dictionary attacks. In reality, it is also difficult to have
common physical interfaces in both of the devices, and carrying cables all of the time might not
be possible for owners of the devices. Balfanz et al. [5] extended Stanjano and Anderson’s work
and proposed a two-phase authentication method for pairing of co-located devices using infrared
as a location limited side channel. In their proposed solution, pre-authentication information is
exchanged over the infrared channel and then the user switches to the common wireless
channel. Slightly different variations of Balfanz et al [5] approach are proposed in [6-9], which
also use location limited side channel to transfer the pre-authentication data. The common
problem with these approaches is twofold: first, they need some kind of interface (e.g. IrDA,
laser, ultrasound, etc) for pre-authentication phase and are vulnerable to passive eavesdropping
attack in the location limited side channels, e.g. two remotes and one projector. Some other
pairing schemes including Bluetooth require the human operator to put the communicating
partners into discovery mode. After discovery and selection of a device, the channel is secured
by entering the same PIN or password into both devices. Although it is a general approach, it
gives rise to a number of usability and security issues [10, 11]. For example, a short password or
PIN number makes it vulnerable to dictionary or exhaustive search attacks. Further, in
Bluetooth pairing an adversary can eavesdrop to break the security from a long distance using
powerful antennas.
Based on the pairing protocol of Balfanz et al. [5], some other schemes are proposed through
the use of audio and visual out-of-band channels. One such system is Seeing-is-Believing (SiB)
[12]. SiB uses two dimensional bar codes for exchanging pre-authentication data between the
devices. In the proposed approach, device A encodes cryptographic material into a two-
dimensional barcode and displays it on the screen, then device B reads it through a camera to
setup an authenticated channel. To reduce the camera requirement in one of the pairing device
40
3. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
in SiB, Saxena et al. [13] extended the work of McCune et al. [12] and proposed an
improvement to it through the use of simple light source, such as LEDs, and short authenticated
integrity checksums. In the proposed scheme, device A needs to be equipped with a camera and
device B with a single LED. When the LED on device B blinks, device A takes a video clip.
Then, video clip is parsed to extract an authentication string. Loud and Clear (L&C) [14] and
Human-Assisted Pure Audio Device Pairing (HAPADEP) [15] use audio as an out-of-band
channel to securely pair the devices. The main idea of L&C [14] scheme is to encode the hash
of first device’s public key into a MadLib sentence (i.e. grammatically correct but nonsensical
sentence) and transmit it over a device-to-human channel using a speaker or a display. Then,
second device also encodes the hash of the received public key from first device into the
MadLib sentence and transmit it over a device-to-human channel using a speaker or a display.
Then user is responsible to compare the two sentences and to accept or reject the pairing. There
are two variants of this approach: speaker-to-speaker and display-to-speaker. In first method
user is required to compare and verify the two sentences vocalized by the pairing candidate
devices. In the second method, user is required to compare the displayed MadLib sentence on
one device with the vocalized MadLib sentence from the other device. Finally, user is
responsible for accepting or rejecting the pairing based on the results of comparison. In
HAPADEP [15], Soriente et al. consider the problem of pairing two devices that have no
common wireless communication channel, such as Bluetooth or WiFi, at the time of pairing.
The proposed scheme uses pure audio to exchange both public keys and hashes of public keys.
The pairing schemes that use audio and/or visual out of band channels [12-14] are also
inapplicable in some of the scenarios. For example, SiB [12] requires that devices must be
equipped with camera; while in L&C [14] a speaker and/or display is required, and HAPADEP
[15] is applicable in those scenarios where both devices have a microphone and a speaker.
Camera equipped devices are usually prohibited in high security areas; while the latter is not
suitable for hearing-impaired users. Further, bar code scanning requires sufficient proximity and
light in SiB; while L&C and HAPADEP places some burden on the user for comparison of
audible sequences. An adversary can easily subvert bar code stickers on devices in SiB; while
ambient noise makes authentication either weak or difficult in L&C as well as in HAPADEP.
While [13] is a variation of SiB, so this scheme has few of the same limitations as SiB, such as
requiring close proximity and a camera in at least one of the device.
Unlike previously described approaches, the idea of shaking devices together to pair them has
become more common. Smart-its-Friends [16] is the first effort that proposed pairing of two
devices using a common movement pattern and used accelerometers as an out-of-band channel.
In this approach, two devices are held and shaken together simultaneously. Then, common
readings from the embedded accelerometers in the devices are exploited to establish the
communication channel between the two devices. However, security has not been the major
concern of Smart-its-Friends. The follow-on method to Smart-its-Friends is Shake Well Before
Use [17]. Mayrhofer and Gellersen extended the Holmquist et al. [16] approach and proposed
two protocols to securely pair the devices. Both of the proposed protocols exploit the
cryptographic primitives with accelerometer data analysis for secure device-to-device
authentication. First protocol uses public key cryptography and is more secure as compared to
the second protocol, which is more efficient and computes secret key directly from
accelerometer’s data. Another approach that requires shaking or moving patterns is Shake Them
Up [18]. Authors suggest a manual technique for pairing two resource-constrained devices that
involves shaking and twirling them in very close proximity to each other. Unlike Smart-its-
Friends and Shake Well Before Use, this approach exploits the source indinguishability property
of radio signals and does not require embedded accelerometers. While being shaken, two
devices exchange radio packets and agree on a key one bit at a time, relying on the adversary’s
inability to determine the source of radio packet (sending device). Secure pairing of devices by
shaking devices together is an interesting approach. However, these schemes require 2D
accelerometers in both of the devices. Further, shaking devices together is always not possible,
41
4. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
since there is large variety of devices, such as printers, projectors and laptops that can not be
hold and shaken together simultaneously. While Shake Them Up is susceptible to attack by an
eavesdropper that exploits the differences in the baseband frequencies of the two radio sources.
Recently, Varshavsky et al. [19] proposed – Amigo – a proximity-based technique for secure
pairing of co-located devices. Authors extended Diffie-Hellman key exchange protocol with the
addition of key verification stage. The proposed approach exploits the common radio signals
from locally available wireless access points to establish the secure channel between the
devices. Since, AMIGO uses the common radio signals from the located access points; it is not
applicable in the scenarios, where the radio data is not available to process or where the wireless
network is easy to eavesdrop on while remaining hidden. It is also a fact that in many under
developing countries 802.11-based wireless technology is less popular as compared to
Bluetooth technology that is more popular and common due to the mobile phones.
Some other efforts towards secure device pairing include Button-Enabled Device Association
(BEDA) [20], LoKey [21], Are You With Me? [22] and Malkani et al.’s work [23, 24]. BEDA
is proposed by Soriente et al., and it has four variants. The main idea is to transfer the short
secret key from one device to the other using ‘button-presses’ and then use that key to
authenticate the public keys of the devices. Short secret key is agreed upon between the two
devices via one of the four variants of BEDA. These are called button-to-button (B-to-B),
display-to-button (D-to-B), short vibration-to-button (SV-to-B) and long vibration-to-button
(LV-to-B). The first and basic variant (i.e. B-to-B) involves the user simultaneously pressing
buttons on both of the devices within certain random time-intervals and each of these intervals
are used to derive 3-bits of the short secret key. LoKey uses SMS messages to authenticate key
exchanged over the internet. However, this approach incurs substantial monetary cost and delay.
While, Are You With Me? again requires accelerometers and is not applicable in the scenarios
as Shake Well Before Use or Smart-its-Friends. Malkani et al. [23, 24] have proposed a generic
framework for secure device association. In the proposed system devices first register their
capabilities with the directory service. Then, whenever two devices need to create an
association, the client (device A) queries the directory service to discover and acquire the
required information to initiate a secure pairing with the target device (device B). Based on the
information from directory service, both the client (device A) and resource (device B) mutually
execute a common pairing protocol. This protocol involves the generation of a key from
interaction with the environment. The selected interactions generate an appropriate key for the
nature of the intended association, and a successful pairing arises when matching keys are
generated on both of the devices.
In summary, there is an immense literature on secure device association. However, some of the
proposed techniques or protocols are not implemented at all; while others are implemented and
evaluated in a stand-alone manner without being compared with other related work [1, 25].
Examples of these include Resurrecting Duckling Security Model [4], Talking to Strangers [5],
AMIGO [19], Shake Well Before Use [17], some of the Saxena et al.’s proposed methods [26]
and four variants of BEDA [20] approach. Since the motivation for this work is [25] that
presents state-of-the-art in the area of secure device pairing along with some future research
directions, therefore, one can refer it for further details.
3. DESIGN AND DEVELOPMENT
An extensive set of comparative usability tests can play a vital role in the process of
standardizing pairing methods. However, conducting such a detailed case study is not an easy
task due to several reasons. For example, it is very tedious and laborious job to implement all of
the existing (more than two dozens) pairing methods using a common platform. Even it
becomes more difficult when implementing network functionality since these schemes use
numerous wireless channels, such as Bluetooth, WiFi, Ultrasound, Infrared, etc. We believe that
42
5. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
our designed simulator reduces the development and implementation efforts for pairing
protocols and makes it easy to conduct several usability tests to evaluate them.
Figure 1: Screen shot of the simulator showing simulated devices (Alice and Bob)
Figure 2: Screen shot of the simulator showing some of the test results
Figure 1 and figure 2 shows the screen shots of the simulator. Our simulator supports automated
test sessions, automatic test data collection, logging errors, and also facilitates to simulate
several attack scenarios, such as MiTM. Test organizer/developer does not need to develop new
device interfaces for pairing methods each time, since the simulator supports simulation of
devices having combinations of eight installed capabilities. Therefore, existing and new pairing
methods can easily be implemented and tested with minimum development efforts. Figure 1
illustrates a typical test session, while figure 2 illustrates how does test organizer can see the
results at the end of the test without taking any extra efforts. The designed simulator is capable
of showing final results in tabular as well as in graphical/charts form. We have used java to
write the code of simulator. Eclipse is used as an IDE. Some of the third party libraries used in
43
6. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
the development of this simulator include Bouncy Castle Cryptographic library [27] and
Chart2D library [28]. Bouncy Castle is a lightweight collection of APIs used in cryptography.
These APIs can work with J2ME, J2SE and there are also APIs for C# programming language.
While Chart2D is a Java class library for drawing 2D charts or graphs. Some of the features of
the designed simulator are summarized below:
1. Simulator can be used either locally running on one computer, or remotely running on two
different computers (i.e. one for Alice and other for Bob)
2. It facilitates logging of test date and time, pairing method’s parameters (such as pairing
scheme name, total pairing time, false –ves, false +ves), and devices’ capabilities information.
3. It is capable of auto-generating results in tabular form as well as in charts or graphical form.
5. It also provides the entire test log information as a raw-result-set in form of a text file.
5. It facilitates the test organizers to create and store the batch of test-scenarios prior to the
experiment/tests.
6. Currently it has support for Bluetooth and 802.11 networks.
4. EVALUATION OF SIMULATOR
We conducted a case study of some of the existing pairing methods using the designed
simulator for evaluation purposes. Results of the study have proved to be positive. The objective
of the study was to evaluate the usability of four pairing methods as well as the simulator itself.
These four methods are Button-to-Button, Display-to-Button, LED-to-Button and Beep-to-
Button. First two methods are described in [20], while other two are variations of second
method (i.e. Display-to-Button). A brief description of each of the implemented method is given
below.
(i) Button-to-Button (B-to-B)
In this method user is required to press and release the button on both of the devices (i.e. device
A and device B) simultaneously with random time-intervals. Both of the simulated devices are
programmed to start a timer with the first button press. Then, the elapsed time between
subsequent button-presses is exploited to calculate the key. From each time-interval 3-bits of the
secret are generated.
(ii) Display-to-Button (D-to-B)
In this method target device (device B) selects a key, encode and transmit it through random
flashes of the display. Whenever the display of device B flashes user is required to press and
release button on device A. Likewise previous approach, the elapsed time between each button-
press is used to calculate the bits of shared key on device A.
(iii) LED-to-Button (LED-to-B)
This scheme is similar to Display-to-Button approach. The only difference is that instead of a
display, an LED is used to transmit the bits of shared secret. This scheme is suitable in the
situations where one of the devices has only a button and the other has only a single LED (e.g.
wireless access point). This scheme works in the same way as the previous one. Device B
chooses a key and transmits it through LED-blinks with random time-intervals. To obtain same
44
7. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
shared secret on device A, user is responsible to press and release button on the device
whenever an LED blinks on device B.
(iv) Beep-to-Button (Beep-to-B)
This scheme is also a variation of Display-to-Button method. In this scheme, device B selects a
key and transmits it through random beeps. User is required to press and release button on first
device whenever he/she hears a beep sound from the other device. This method is useful in the
scenarios where first device has only a single button and the other device has only a speaker.
4.1. Test Procedure
A total of 15 volunteers were recruited. All of the participants were chosen on first-come first-
serve basis. All of the participants are students and most of them are PhD students. They all are
good computer users. The background profile information of the participants is summarized in
table 1.
Table 1. Test Participants Profile Information
Gender Male: 86.66%
Female: 13.33%
Age 25 – 30: 40%
31 – 36: 40%
37 – 42: 20%
Last academic qualification achieved Bachelor: 26.66%
Masters 73.33%
Having experience of pairing two devices Yes: 93.33%
No: 6.33%
The tests were conducted in two environments; a lab-based environment using desktop
computers, running Windows XP operating system, and a home-based environment using
laptops, running Windows Vista operating system. Before the start of each experiment, we have
explained briefly the goals of the experiment along with the description of each pairing method
to the participant. Then, a pre-test questionnaire is filled by the participant before starting the
test cases.
Each experiment consists of three parts. In first part, three methods LED-to-Button, Display-to-
Button and Beep-to-Button are tested. Since, the simulator facilitates to generate and store the
batch of test scenarios that can be executed later on demand; so, we created a batch of six tests
scenarios (two for each method) a priori. This facilitates each participant to perform all of the
six tests in one-go without any interruption. In second part of the experiment, each participant
performed two repetitions of Button-to-Button method. Left-button of the mouse is used as a
button of the simulated device. Participant is required to click on ‘Push-Button’ simultaneously
with random time-intervals on both of the simulated devices. This test requires two machines,
one for simulating Alice (button-capable device A) and other for simulating Bob (button-
capable device B). In third part, we asked the user to build any of the preferred method using the
simulator and execute it. It gave the user an opportunity to examine the usability of the designed
simulator. Finally, at the end of experiment every participant filled a post-test questionnaire that
contains questions regarding the usability (from very easy to not usable at all) of each of the
method and the simulator.
45
8. International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
4.2. Results and Discussion
Table 2. Results generated by the simulator based on logged data
Figure 3: Mean and standard deviation (sd) of pairing time
Results presented in this section are obtained from the collected data by means of questionnaire
and as well as by the generated log file of the simulator. Table 2 above shows the results that are
auto-generated by the simulator. The graphs shown in figures 3 and 4 are also auto-generated by
the simulator using logged data. Other graphs shown in figures 5, 6 and 7 are drawn from the
data obtained through post-test questionnaire. Microsoft Excel is used to draw these graphs.
Figure 4: False negatives (safe error) rate of pairing methods
According to the graph shown in figure-3, using a button on both devices is faster than all of the
other schemes. Figure 4 shows that B-to-B has the minimum number of false negatives, while
46
9. %ageofParticipants
Paricipants
Pereferencerate
(%)
International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.3, October 2009
LED-to-B has the maximum number of false negatives. Figure 5 shows that majority of the
participants considered B-to-B and D-to-B methods very easy to use; while none considered B-
to-B method as hard to use. Figure 6 shows that most of the users preferred B-to-B and D-to-B
methods over LED-to-B and Beep-to-B methods in the case if their devices support all of the
four methods. Graph in figure 7 presents the evaluation results for the designed simulator itself.
33% users considered it very easy to use; while 67% considered it as easy to use and none of
them considered it as hard, very hard or not usable at all. These results show that the designed
simulator is applicable for testing usability of pairing methods from both developer and users
point of view. Since the data presented in table 2 and graphs shown in figures 3 – 7 are self-
explanatory, so instead of describing them in more detail, we would like to discuss how this
simulator can be helpful in the research of generalizing or standardizing the secure device
pairing mechanism.
60
50
40
very easy to use
30 easy to use
hard to use
20
very hard to use
not usabled at all
10
0
B-to-B LED-to-B D-to-B Beep-to-B
Schemes
Figure 5: Participants response for the usability of pairing methods
Par ticipants Pr e fe r e nce
s
35 33.33 33.33
30
25
20
20
15 13.33
10
5
0
Button-to-
Button
LED-to-
Button
Display-to-
Button
Beep-to-
Button
Sche m e
Figure 6: Participants preference of the pairing method
47
10. %ageofParticipants
70
60
50
40
30
20
10
0
very easy to
use
easy to use hard to use very hard to
use
Difficulty le ve l in us ing s im ulator
not usable at
all
Figure 7: Level of difficulty in using the simulator
As motivation, let’s consider a device pairing scenario where device A is only button-capable
and device B has display, LED and as well as a speaker. Note that in this scenario we are
considering only the four pairing methods along with results obtained as a consequence of our
case study. So, in the scenario possible pairing methods are Display-to-Button, LED-to-Button
and Beep-to-Button. The questions is how does user (or a system such as [24]) decide the best
pairing scheme among three of these possible methods. In this and other similar situations, user
or system needs to have the knowledge of priority-level (or some specific measures) of each of
the candidate method, so that the best possible pairing method can be selected. This priority-
level can be set based on the level of security provided by the method and as well as the
usability of that method. We believe that the results of this and other more detailed usability
studies using the designed simulator can be helpful to prioritize or set weights for each of the
pairing method based on their usability and the level of provided security. For example, based
on the obtained results of our case study, Display-to-Button has the highest priority in the
scenario presented above. So, user/system should select this protocol to initiate the pairing.
Further, this simulator can be helpful to rapidly implement and test a large set of pairing
schemes in order to specify certain common or standard measures for up-coming pairing
protocols.
5. CONCLUSIONS
There has been done an immense work in the field of secure device pairing from both academic
research and industrial research points of view. However, no one has yet devised the perfect
pairing scheme that could be feasible for all kind of or large set of scenarios. Pairing schemes
vary in the strength of their security, the level of required user intervention, their susceptibility
to environmental conditions and in the required physical capabilities of the devices as well as
the required proximity between the devices. So, we still need other mechanisms,
infrastructures, tools and techniques that integrate several pairing techniques within a general
architecture for providing secure as well as usable pairing mechanisms (such as [24]). One of
the reasons for lack of a general, standardized or universal pairing mechanism is an uneven
comparative evaluation of the several existing methods. It might be because of unavailability of
specialized tools that provide a common platform to test the usability or security of these
methods against some common set of measures. This creates the need to design new tools, such
as simulators, benchmarks and usability testing frameworks, that can be used to evaluate the
existing as well as new pairing schemes [25]. This motivated us towards the design and
development of the pairing simulator. Our designed simulator is capable of generating and
saving test scenarios a priori, logging test information and generating textual, tabular as well as
11. graphical results from the logged data at the completion of each test case. We believe that it will
be very helpful for both the researchers and other less technical persons working in the area of
device pairing to rapidly implement and test new pairing protocols without writing extensive
piece of code.
ACKNOWLEDGEMENTS
This research is sponsored/funded by University of Sindh, Jamshoro, Pakistan under Mega
Project Phase-I: No.SU/PLAN/F.SCH/650 and the work presented in this paper is part of
authors earlier published work [24, 25].
REFERENCES
[1] Kumar, A., et al. Caveat eptor: A comparative study of secure device pairing methods. in IEEE
International Conference on Pervasive Computing and Communications (PerCom-09). 2009.
[2] Diffie, W. and M.E. Hellman, New Directions in Cryptography. IEEE Transactions on
Information Theory, 1976. IT-22(6): p. 644--654.
[3] Stajano, F., The Resurrecting Duckling - What Next?, in Revised Papers from the 8th
International Workshop on Security Protocols. 2001, Springer-Verlag.
[4] Stajano, F. and R. Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless
Networks, in Security Protocols. 2000. p. 172-182.
[5] Balfanz, D., et al. Talking to strangers: Authentication in adhoc wireless networks. in
Symposium on Network and Distributed Systems Security (NDSS '02). 2002. San Diego,
California.
[6] Mayrhofer, R. and M. Welch. A Human-Verifiable Authentication Protocol Using Visible Laser
Light. in Availability, Reliability and Security, 2007. ARES 2007. The Second International
Conference on. 2007.
[7] Mayrhofer, R., M. Hazas, and H. Gellersen, An authentication protocol using ultrasonic ranging:
Technical Report. 2006, Lancaster University.
[8] Mayrhofer, R. and H. Gellersen. On the Security of Ultrasound as Out-of-band Channel. in
Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. 2007.
[9] Spahic, A., et al., Pre-Authentication using Infrared Privacy, Security, and Trust Within the
Context of Pervasive Computing, 2005.
[10] Shaked, Y. and A. Wool. Cracking the Bluetooth PIN. in MobiSys '05: Proceedings of the 3rd
international conference on Mobile systems, applications, and services. 2005. Seattle,
Washington: ACM.
[11] Jakobsson, M. and S. Wetzel, Security Weaknesses in Bluetooth, Lecture Notes in Computer
Science, 2001. 2020: p. 176+.
[12] McCune, J.M., A. Perrig, and M.K. Reiter, Seeing-is-believing: using camera phones for human-
verifiable authentication. Security and Privacy, 2005 IEEE Symposium on, 2005: p. 110 - 124.
[13] Saxena, N., et al., Secure Device Pairing based on a Visual Channel. sp, 2006. 0: p. 306-313.
[14] Goodrich, M.T., et al. Loud and Clear: Human-Verifiable Authentication Based on Audio. in
Distributed Computing Systems, ICDCS 2006. 26th IEEE International Conference. 2006.
[15] Soriente, C., G. Tsudik, and E. Uzun (2007) HAPADEP: Human Asisted Pure Audio Device
Pairing. Cryptology ePrint Archive, Report 2007/093.
[16] Holmquist, L.E., et al., Smart-Its Friends: A Technique for Users to Easily Establish
Connections between Smart Artefacts, in Proceedings of the 3rd international conference on
Ubiquitous Computing. 2001, Springer-Verlag: Atlanta, Georgia, USA.
12. [17] Mayrhofer, R. and H. Gellersen, Shake Well Before Use: Authentication Based on
Accelerometer
Data, in 5th International Conference on Pervasive Computing (Pervasive 2007).
2007.
[18] Castelluccia, C. and P. Mutaf, Shake them up!: a movement-based pairing protocol for CPU-
constrained devices, in Proceedings of the 3rd international conference on Mobile systems,
applications, and services. 2005, ACM: Seattle, Washington.
[19] Varshavsky, A., et al., Amigo: Proximity-Based Authentication of Mobile Devices, in UbiComp
2007: Ubiquitous Computing. 2007. p. 253-270.
[20] Soriente, C., G. Tsudik, and E. Uzun. BEDA: Button-Enabled Device Association, in Internation
Workshop on Security and Spontaneous Interaction (IWSSI 2007). 2007.
[21] Nicholson, A., et al., LoKey: Leveraging the SMS Network in Decentralized, End-to-End Trust
Establishment, in Pervasive Computing. 2006. p. 202-219.
[22] Lester, J., B. Hannaford, and G. Borriello. Are You with Me?” - Using Accelerometers to
Determine If Two Devices Are Carried by the Same Person. in Pervasive Computing. 2004:
Springer-Verlag (2004) pg. 33-50.
[23] Malkani, Y.A., D. Chalmers, and I. Wakeman. Towards a General System for Secure Device
Pairing by Demonstration of Physical Proximity (Poster). in UBICOMP Grand Challenge:
Workshop on Ubiquitous Computing at a Crossroads: Art, Science, Politics and Design. 6th and
7th January, 2009. Huxley Building, Imperial College, London.
[24] Malkani, Y.A., et al., Towards a General System for Secure Device Pairing by Demonstration of
Physical Proximity, in MWNS-09 co-located with IFIP Networking 2009 Conference, Shaker
Verlag: Aachen, Germany. ISBN: 978-3-8322-8177-9. p. 13-24.
[25] Malkani, Y.A. and L.D. Dhomeja. Secure Device Association for Ad Hoc and Ubiquitous
Computing Environments. in 5th IEEE International Conference on Emerging Technologies
(ICET-09), 2009.
[26] Saxena, N. and J. Voris. Pairing Devices with Good Quality Output Interfaces. in International
Workshop on Wireless Security and Privacy (WISP) (co-located with ICDCS). . 2009.
[27] The Legion of the Bouncy Castle, Url:http://bouncycastle.org/java.html.
[28] The Chart2D Tutorial, URL:http://chart2d.sourceforge.net/Chart2D_1.9.6/Tutorial/Tutorial.htm.
Authors
Mr. Yasir Arfat Malkani is Lecturer at the Institute of Mathematics and
Computer Science (IMCS), University of Sindh, Jamshoro, Pakistan. Currently, he
is a DPhil student and Associate Tutor at University of Sussex, UK. He was
awarded Vice Chancellor's silver medal for obtaining first position in M.Sc
Computer Science at the University of Sindh, Jamshoro (Pakistan) in year
2003. He was appointed as a Research Associate in University of Sindh in 2004,
and then as a Lecturer in July 2005. He was awarded PhD Scholarship from
University of Sindh in year 2006 to pursue his DPhil studies at University of
Sussex, Brighton, UK. His main area of research is Pervasive Computing, and his research is focused on
context awareness and security issues in pervasive and ubiquitous computing environments. Currently, he
is working on the design and development of a generic framework for secure pairing of pervasive devices
by demonstration of physical proximity.
Mr. Lachhman Das Dhomeja is Assistant Professor at the Institute of
Information Technology (IIT), University of Sindh, Jamshoro, Pakistan. Currently,
he is a DPhil student at University of Sussex, Brighton, UK. He got his Master’s
degree in Computer Technology from University of Sindh, Jamshoro (Pakistan).
He was awarded PhD Scholarship from University of Sindh in year 2006 to pursue
his DPhil studies at University of Sussex, Brighton, UK. His main research interest
is in the area of Pervasive Computing. Currently, he is working on policy-based
adaptive systems for Pervasive Computing environments.