Cargando…
A Rhythm-Based Authentication Scheme for Smart Media Devices
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous compu...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4119690/ https://www.ncbi.nlm.nih.gov/pubmed/25110743 http://dx.doi.org/10.1155/2014/781014 |
_version_ | 1782328996646617088 |
---|---|
author | Lee, Jae Dong Jeong, Young-Sik Park, Jong Hyuk |
author_facet | Lee, Jae Dong Jeong, Young-Sik Park, Jong Hyuk |
author_sort | Lee, Jae Dong |
collection | PubMed |
description | In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. |
format | Online Article Text |
id | pubmed-4119690 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-41196902014-08-10 A Rhythm-Based Authentication Scheme for Smart Media Devices Lee, Jae Dong Jeong, Young-Sik Park, Jong Hyuk ScientificWorldJournal Research Article In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. Hindawi Publishing Corporation 2014 2014-07-07 /pmc/articles/PMC4119690/ /pubmed/25110743 http://dx.doi.org/10.1155/2014/781014 Text en Copyright © 2014 Jae Dong Lee et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Lee, Jae Dong Jeong, Young-Sik Park, Jong Hyuk A Rhythm-Based Authentication Scheme for Smart Media Devices |
title | A Rhythm-Based Authentication Scheme for Smart Media Devices |
title_full | A Rhythm-Based Authentication Scheme for Smart Media Devices |
title_fullStr | A Rhythm-Based Authentication Scheme for Smart Media Devices |
title_full_unstemmed | A Rhythm-Based Authentication Scheme for Smart Media Devices |
title_short | A Rhythm-Based Authentication Scheme for Smart Media Devices |
title_sort | rhythm-based authentication scheme for smart media devices |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4119690/ https://www.ncbi.nlm.nih.gov/pubmed/25110743 http://dx.doi.org/10.1155/2014/781014 |
work_keys_str_mv | AT leejaedong arhythmbasedauthenticationschemeforsmartmediadevices AT jeongyoungsik arhythmbasedauthenticationschemeforsmartmediadevices AT parkjonghyuk arhythmbasedauthenticationschemeforsmartmediadevices AT leejaedong rhythmbasedauthenticationschemeforsmartmediadevices AT jeongyoungsik rhythmbasedauthenticationschemeforsmartmediadevices AT parkjonghyuk rhythmbasedauthenticationschemeforsmartmediadevices |