skip to main content
10.1145/1050873.1050880acmconferencesArticle/Chapter ViewAbstractPublication PagesubimobConference Proceedingsconference-collections
Article

AuthenLink: a user-centred authentification system for a secure mobile com

Published: 01 June 2004 Publication History

Abstract

We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless devices. In this paper, we propose a new RFID-based wireless authentication system, not yet implemented, called "AuthenLink" designed for mobile devices, coupled with a new approach to distinguishing characteristics to authenticate people (authentication factor): something you CONVEY. The utmost purpose of this paper is to provide an ease, user-centred and acceptable security authentication system especially against fraud, counterfeit, and theft for the wireless domain (cellular phones and personal digital assistants PDAs). Our authentication system achieves its goal through a microprocessor chip (ChipTag) computer implanted under human skin. This Chip Tag is able to authenticate user's access to systems, connect them wirelessly, through the Radio Frequency Identification (RFID) technology [5], and also enable mobile users to perform mobile transactions.

References

[1]
Braz, C., AuthenLink: A User-Centred Authentication System for a Secure Mobile, Master thesis, Université de Montréal (Quebec) Canada (2003) http://step.polymtl.ca/-chbraa/masterThesis.htm
[2]
Barrett, D. & Silverman R., SSH, The Secure Shell - The Definitive Guide, 1st Edition, O'Reilly & Associates, Inc., 101 Morris West, Sebastopol, CA - U.S. (2001).
[3]
Burnett, S. & Paine, S., RSA Security's Official Guide To Cryptography, RSA Press, McGraw-Hill Companies, Berlkeley, California - U.S.A. (2002).
[4]
Josang, A. & Patton, M., User Interface Requirements for Authentication of Communication, Security Usability White Paper, Distributed Systems Technology Centre, QUT, Brisbane, Qld 4001, Australia (2001).
[5]
RFID Journal, Radio Frequency Identification, http://www.aimglobal.org/technologies/rfid/
[6]
Smith, R., Authentication: From Passwords to Public Keys, Addison-Wesley, 1st edition U.S.A. (2002).

Cited By

View all
  • (2016)GlanceID: A Usable, Single, and Yet Strong Optical Authentication MethodAdvances in Physical Ergonomics and Human Factors10.1007/978-3-319-41694-6_59(609-620)Online publication date: 12-Jul-2016

Index Terms

  1. AuthenLink: a user-centred authentification system for a secure mobile com

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    UbiMob '04: Proceedings of the 1st French-speaking conference on Mobility and ubiquity computing
    June 2004
    226 pages
    ISBN:1581139152
    DOI:10.1145/1050873
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Architecture, Réseaux et systèmes, Parallélisme, GdR-CNRS
    • ACM: Association for Computing Machinery
    • Institut IMAG: Informatique et Mathématiques Appliquées de Grenoble
    • AFIHM: Ass. Francophone d'Interaction Homme-Machine
    • GdR I3: Information, Interaction, Intelligence, GdR-CNRS
    • CNRT Télius: Centre National de Recherche Technologique Télius

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)GlanceID: A Usable, Single, and Yet Strong Optical Authentication MethodAdvances in Physical Ergonomics and Human Factors10.1007/978-3-319-41694-6_59(609-620)Online publication date: 12-Jul-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media