Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions - Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices Access content directly
Conference Papers Year : 2010

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

Abstract

Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security but potentially reduce usability of protocols which may result in users making mistakes that compromise security. This conflict between technical security and usability requires methods for transferring fingerprints between devices that maximise both to achieve acceptable effective security. In this paper, we propose two methods for transferring fingerprints between devices. We conducted a usability and security evaluation of the methods and our results show that, in contrast to previous proposals, our methods are both usable and resistant to security failures.
Fichier principal
Vignette du fichier
60330311.pdf (112.49 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01056076 , version 1 (14-08-2014)

Licence

Attribution

Identifiers

Cite

Ronald Kainda, Ivan Flechais, A. W. Roscoe. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.308-315, ⟨10.1007/978-3-642-12368-9_24⟩. ⟨hal-01056076⟩
68 View
100 Download

Altmetric

Share

Gmail Facebook X LinkedIn More