Seeing-is-believing: Using camera phones for human-verifiable authentication

被引:134
作者
McCune, JM [1 ]
Perrig, A [1 ]
Reiter, MK [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
来源
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2005年
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP.2005.19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyze Seeing-Is-Believing, a system that utilizes 2D barcodes and camera-phones to implement a visual channel for authentication and demonstrative identification of devices. We apply this visual channel to several problems in computer security, including authenticated key exchange between devices that share no prior context, establishment of a trusted path for configuration of a TCG-compliant computing platform, and secure device configuration in the context of a smart home.
引用
收藏
页码:110 / 124
页数:15
相关论文
共 45 条
[1]  
Allen C., 1999, RFC, DOI [DOI 10.17487/RFC2246, 10.17487/RFC2246]
[2]  
[Anonymous], 1960, J SOC IND APPL MATH
[3]  
BALACHEFF B, 2003, TRUSTED COMPUTING PL
[4]  
Balfanz D., 2002, NDSS, P1
[5]  
BELLARE M, 2001, P ADV CRYPT ASISCRYP
[6]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[7]  
Bellovin SM, 1993, P CCS, P244
[8]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[9]  
BURNSIDE M, 2002, P PERV COMP PERV AUG
[10]  
CAPKUN S, 2003, P ACM S MOB AD HOC N