DocumentCode
769413
Title
Mobile Device Security Using Transient Authentication
Author
Nicholson, Anthony J. ; Corner, Mark D. ; Noble, Brian D.
Author_Institution
Dept. of Electr. Eng. & Comput. Sci., Michigan Univ., Ann Arbor, MI
Volume
5
Issue
11
fYear
2006
Firstpage
1489
Lastpage
1502
Abstract
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user´s presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead
Keywords
message authentication; mobile computing; bothersome reauthentication; mobile device security; transient authentication; Authentication; Creep; Cryptography; Data security; Human factors; Mobile computing; Personal digital assistants; Portable computers; Protection; Secure storage; Transient authentication; cryptographic controls; human factors; mobile computing; privacy.; security;
fLanguage
English
Journal_Title
Mobile Computing, IEEE Transactions on
Publisher
ieee
ISSN
1536-1233
Type
jour
DOI
10.1109/TMC.2006.169
Filename
1704815
Link To Document