2007
DOI: 10.1007/978-3-540-74853-3_15
|View full text |Cite
|
Sign up to set email alerts
|

Amigo: Proximity-Based Authentication of Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
130
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 111 publications
(130 citation statements)
references
References 13 publications
0
130
0
Order By: Relevance
“…In addition, contextbased detection assumes that attackers cannot infer the information needed for verification at a distance. For example, GPS coordinates and/or RF packets can be used as contextual information for proximity detection [40][41][42][43].…”
Section: Received Signal Strength Indicator (Rssi)mentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, contextbased detection assumes that attackers cannot infer the information needed for verification at a distance. For example, GPS coordinates and/or RF packets can be used as contextual information for proximity detection [40][41][42][43].…”
Section: Received Signal Strength Indicator (Rssi)mentioning
confidence: 99%
“…Varshavsky et al proposed a proximity-detection method that uses RF packets and RSSI as contextual information [43]. Shrestha et al proposed a method that exclusively relies on contextual information such as temperature, precision gas, humidity, and altitude [41].…”
Section: Received Signal Strength Indicator (Rssi)mentioning
confidence: 99%
“…Liang Xiao, Qiben Yan, Wenjing Lou, Guiquan Chen, and Y. Thomas Hou [2] this paper first introduce Amigo, an algorithm that extends the Diffie-Hellman key exchange with verification of device co-location. They showed that by using knowledge of dynamic characteristics of device's common radio environment as proof of physical proximity, it is possible to securely pair devices that come within close proximity.…”
Section: Related Workmentioning
confidence: 99%
“…Integrity and authenticity can be addressed with distance bounding [7] or RF fingerprinting [8] solutions. Physical proximity of devices and location dependent characteristics of radio signals are used to establish secret keys and trust between devices [9][10][11].…”
Section: Security In Wireless Communicationmentioning
confidence: 99%