Using the Smartphone as a Personal Information Security Center

被引:0
作者
Hou, Yung-Tsung [1 ]
机构
[1] Natl Formosa Univ, Dept Informat Management, Taipei, Taiwan
来源
APPLIED MATHEMATICS & INFORMATION SCIENCES | 2012年 / 6卷 / 02期
关键词
Smartphone; Security; Key Management; Key Exchange;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With increasing power, the smartphone has become a new computing platform. A smartphone can efficiently execute a complex computing job, such as public-key encryption, which was usually run on workstations. This work presents a security management framework that uses a smartphone as a personal information security center (PISC) coordinating other devices of the user. The proposed framework is composed of two major parts: PISC key management and PISC security service coordination. In PISC key management, the smartphone manages the public key exchange between different users' smartphones. The key exchange utilizes a human-perceivable video channel to transfer keys and utilizes the phone camera to create an undeniable cryptographic nonce for key verification. A PISC phone also acts as a coordinator to provide keychain synchronization, authentication, and confidentiality services to all the user's devices. With the use of a PISC phone, a user can efficiently govern the security management of all her devices with little burden.
引用
收藏
页码:573S / 578S
页数:6
相关论文
共 9 条
[1]  
[Anonymous], 26 IEEE INT C DISTR
[2]  
Falaki H., 2010, 8 INT C MOB SYST APP, P310
[3]  
Josang A., 1999, NETW DISTR SYST SEC, P1222
[4]   SPATE: Small-Group PKI-Less Authenticated Trust Establishment [J].
Lin, Yue-Hsun ;
Studer, Ahren ;
Chen, Yao-Hsin ;
Hsiao, Hsu-Chun ;
Kuo, Li-Hsiang ;
Lee, Jason ;
McCune, Jonathan M. ;
Wang, King-Hang ;
Krohn, Maxwell ;
Lin, Phen-Lan ;
Perrig, Adrian ;
Sun, Hung-Min ;
Yang, Bo-Yin .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (12) :1666-1681
[5]   Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices [J].
Mayrhofer, Rene ;
Gellersen, Hans .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (06) :792-806
[6]  
Sheng S., 2006, S US PRIV SEC PITTSB, P156
[7]   Secure pairing of interface constrained devices [J].
Soriente, Claudio ;
Tsudik, Gene ;
Uzun, Ersin .
International Journal of Security and Networks, 2009, 4 (1-2) :17-26
[8]  
STALLINGS W, 1995, BYTE, V20, P161
[9]  
Stallings W., 2003, CRYPTOGRAPHY NETWORK