{"title":"RFID-Based Authentication Middleware for Mobile Devices","authors":"Ewa Syta, S. Kurkovsky, B. Casano","doi":"10.1109/HICSS.2010.320","DOIUrl":null,"url":null,"abstract":"Ever-growing popularity of mobile devices, such as smart phones and netbooks, coupled with anytime and anyplace availability of high-speed network access is changing the ways how we compute and communicate. Mobile devices play an increasingly important role in our lives and tend to become representations of our digital selves when we trust these devices with sensitive information. Consequently, the problem of securing mobile devices against unauthorized access has never been more important. We present an RFID-based Authentication Middleware (RFID-AM) that combines point of entry and continuous authentication with transparent on-demand encryption of user files. This paper details the architecture of RFID-AM, discusses its fully functional prototype, and presents experimental results demonstrating its performance in various conditions. This paper also surveys different methods and technologies that have been proposed and implemented on mobile devices.","PeriodicalId":328811,"journal":{"name":"2010 43rd Hawaii International Conference on System Sciences","volume":"337 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 43rd Hawaii International Conference on System Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2010.320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
Ever-growing popularity of mobile devices, such as smart phones and netbooks, coupled with anytime and anyplace availability of high-speed network access is changing the ways how we compute and communicate. Mobile devices play an increasingly important role in our lives and tend to become representations of our digital selves when we trust these devices with sensitive information. Consequently, the problem of securing mobile devices against unauthorized access has never been more important. We present an RFID-based Authentication Middleware (RFID-AM) that combines point of entry and continuous authentication with transparent on-demand encryption of user files. This paper details the architecture of RFID-AM, discusses its fully functional prototype, and presents experimental results demonstrating its performance in various conditions. This paper also surveys different methods and technologies that have been proposed and implemented on mobile devices.