A new design of wearable token system for mobile device security

Increasingly, today's mobile devices provide users a high level of convenience and flexibility. But, mobile devices are vulnerable to theft and loss, greatly increasing the likelihood of exposing sensitive data. To address this problem, Corner and Noble gave the concept of transient authentication and built a wearable token system, called ZIA system. In this paper, we design a new wearable token system using the idea of transient authentication. Our system not only preserves the same security characteristics as ZIA system, but also is more effective than ZIA system. In our system, careful key management and prudent communication mechanism allow significant performance enhancements. Due to the power constraint of the wearable token and the wireless link, the lower the costs are, the greater the chance of success the wearable token system has in practical implementation.

[1]  Brian D. Noble,et al.  Mobile Device Security Using Transient Authentication , 2006, IEEE Transactions on Mobile Computing.

[2]  Jizhou Sun,et al.  An Efficient Modular Exponentiation Algorithm against Simple Power Analysis Attacks , 2007, IEEE Transactions on Consumer Electronics.

[3]  Da-Zhi Sun,et al.  Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme , 2005, Appl. Math. Comput..

[4]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[5]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[6]  Dakshi Agrawal,et al.  The EM Side-Channel(s) , 2002, CHES.

[7]  Da-Zhi Sun,et al.  Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme , 2005, Appl. Math. Comput..

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[11]  Brian D. Noble,et al.  Protecting File Systems with Transient Authentication , 2005, Wirel. Networks.

[12]  Da-Zhi Sun,et al.  Improved public key authentication scheme for non-repudiation , 2005, Appl. Math. Comput..

[13]  Bruce Schneier,et al.  Side channel cryptanalysis of product ciphers , 2000 .

[14]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[15]  Mandayam T. Raghunath,et al.  Application design for a smart watch with a high resolution display , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.

[16]  Da-Zhi Sun,et al.  Remarks on a new key authentication scheme based on discrete logarithms , 2005, Appl. Math. Comput..