Browse > Article

Design and Analysis of an Authentication System based on Distance Estimation using Ultrasonic Sensors  

Park, Jin-O (인하대학교 컴퓨터정보공학부)
Lee, Mun-Kyu (인하대학교 컴퓨터공학부)
Lim, Cheol-Su (서경대학교 컴퓨터공학과)
Abstract
We introduce a user authentication system using distance estimation and a simple challenge response protocol based on a pre-established key. Using the time difference of arrival between an RF signal and an ultrasonic signal, an authenticator verifies if a user's authentication token is within its threshold distance, and it also verifies if the token's response to its random challenge is valid. We implement our authentication system and we analyze the success rates for authentication according to the variations in the distances and facing angles between the authenticator and the token. Our experimental results show that the token is authenticated with very high probability in reasonable settings.
Keywords
Authentication; distance; challenge; nonce; ultrasonic sensor;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kumar, M. and Garfinkel, T. and Boneh, D. and Winograd, T., "Reduing Shoulder-surfing by Using Gaze-based Password Entry," Proceedings of the 3rd symposium on Usable Privacy and security, ACM International Conference Proceeding Series, Vol. 229, pp. 13-19, 2007.   DOI
2 Griswold, C. W and Hedrick, J.R. Uited States Patent (No. 6,629,591): Smart token
3 Hightower, J. and Borriello, G., "Location Systems for Ubiqutous Computing," IEEE Computer, Vol.34, No.8, pp. 57-66, Aug. 2001.   DOI   ScienceOn
4 MCS410 Cricket data sheet, Cricket wireless location system datasheet, Crossbow, http://www.xbow.com/Products/Product_pdf_files/Wireless_pef/MCS410_Cricket_Datasheet.pdf
5 Ultrasound transmitter 255-400ST12 and ultrasound receiver 255-400SR12 datasheet, Mouser Electronics, http://www.mouser.com/catalog/specsheets/KT-400050.pdf
6 CC100 data sheet, Chipcom CC100 single chip transceiver, Texas Instruments, http://focus.ti.com/lit/ug/swru058/swru058.pdf
7 Jakobsson, M and Wetzel, S., "Security Weaknesses in Bluetooth," CT-RSA 2001, LNCS 2020, pp. 176-191, 2001.
8 Want, R. and Hopper, A. and Falcao, V. and Gibbons, J., "The Active Badge Location System," ACM Transactions on Information Systems(TOIS), Vol.10, Issue. 1, pp. 91-102, 1992.   DOI
9 Priyantha, N.B. and Chakraborty, A. and Balakrishnan, H., "The Cricket Location-Support System," Proceedings of the 6th annual international conference on Moblie Computing and Networking (MOBICOM), pp. 32-43, 2000.   DOI
10 Kugler, D., "Man in the Middle Attacks on Bluetooth," Proceedings of inancial Cryptography, LNCS 2742, pp. 149-161, 2003.
11 Nicholson, A. J. and Corner, M.D and Moble, B.D, "Mobile Device Security Using Transient Authentication," IEEE Transactions on Mobile Computing, Vol.5, No.11, pp. 149-161, 2006.   DOI   ScienceOn
12 Capkun, S. and Cagalj, M., "Integrity Regions: Authentication Through Presence in Wireless Networks," Proceeding of the 5th ACM workshop on Wireless Seurity (WiSe), pp. 1-10, 2006.
13 Hightower, J and Want, R. and Borriello, G., "SpotON: An Indoor 3D Location Sensin Technology Based on RF Signal Strength," UW CSE Technical Report #2000-02-02, 2000.
14 Ratha, N.K. and Connell, J.H. and Bolle, R.M., "Enhancing Security and Privacy in Biometricsbased Authentication Systems," IBM Systems Journal(IBMSJ), Vol.40, No.3, pp. 614-634, 2001.   DOI   ScienceOn
15 Bahl, P. and Padmanabhan, V. N, "RADAR: An In-Builking RF-based User Location and Tracking System," Proceedings of the 9th annual joint conference of the IEEE Computer and Communicaion Societies, INFOCOM 2000, Vol.2, pp. 775-784, 2000.
16 Zhu, L. and Zhu, J., "A New Model and its Performance for TDOA Estimation," IEEE Vehicular Technology Conerence 2001, Vol.4, pp. 2750-2753, 2001.