• DocumentCode
    769413
  • Title

    Mobile Device Security Using Transient Authentication

  • Author

    Nicholson, Anthony J. ; Corner, Mark D. ; Noble, Brian D.

  • Author_Institution
    Dept. of Electr. Eng. & Comput. Sci., Michigan Univ., Ann Arbor, MI
  • Volume
    5
  • Issue
    11
  • fYear
    2006
  • Firstpage
    1489
  • Lastpage
    1502
  • Abstract
    Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user´s presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead
  • Keywords
    message authentication; mobile computing; bothersome reauthentication; mobile device security; transient authentication; Authentication; Creep; Cryptography; Data security; Human factors; Mobile computing; Personal digital assistants; Portable computers; Protection; Secure storage; Transient authentication; cryptographic controls; human factors; mobile computing; privacy.; security;
  • fLanguage
    English
  • Journal_Title
    Mobile Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1233
  • Type

    jour

  • DOI
    10.1109/TMC.2006.169
  • Filename
    1704815