Title :
Social Authentication Protocol for Mobile Phones
Author :
Soleymani, Bijan ; Maheswaran, Muthucumaru
Author_Institution :
Departmen of Electr. & Comput. Eng., McGill Univ., Montreal, QC, Canada
Abstract :
With a standard security token, the intruder needs the token and the PIN to masquerade as the user. In our protocol the theft of a single phone would not necessarily result in a security breach, even if the PIN is known to the intruder. To generate enough tokens the intruder needs to have N phones. Where N is the number of tokens required for authentication. Having a large N, maintains high security. However it makes authentication more difficult.
Keywords :
message authentication; mobile handsets; protocols; social networking (online); mobile phones; social authentication protocol; Application software; Authentication; Banking; Biometrics; Bluetooth; Fingerprint recognition; Mobile handsets; Protocols; Retina; Speech recognition; authentication; mobile devices; online social networks;
Conference_Titel :
Computational Science and Engineering, 2009. CSE '09. International Conference on
Conference_Location :
Vancouver, BC
Print_ISBN :
978-1-4244-5334-4
Electronic_ISBN :
978-0-7695-3823-5
DOI :
10.1109/CSE.2009.390