Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Study on Mobile and Pervasive Computing Applications


Affiliations
1 Department of Electrical Engineering, Boston University, United States
2 Department of Electrical Engineering, Boston University, United States
     

   Subscribe/Renew Journal


Artificial Intelligence (AI) is the intelligence displayed by machines different from natural intelligence, which includes consciousness and emotions displayed by humans and animals. "Secure Device Pairing" or "Secure Initial Connection" is a way to guide a secure channel between two previously disconnected devices through some (usually wireless) communication that is not human-recognizable. The previous security context and the lack of existing trust infrastructure have opened the door to man-in-the-middle attacks and evil twin attacks. Mitigating these attacks requires some degree of user involvement in the device pairing method. Previous analyzes have created a variety of technically rational strategies, hoping to be used in many human-recognizable auxiliary out-of-band channels.


User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 133

PDF Views: 1




  • A Study on Mobile and Pervasive Computing Applications

Abstract Views: 133  |  PDF Views: 1

Authors

Adrian Aguilera
Department of Electrical Engineering, Boston University, United States
Catherine Albiston
Department of Electrical Engineering, Boston University, United States

Abstract


Artificial Intelligence (AI) is the intelligence displayed by machines different from natural intelligence, which includes consciousness and emotions displayed by humans and animals. "Secure Device Pairing" or "Secure Initial Connection" is a way to guide a secure channel between two previously disconnected devices through some (usually wireless) communication that is not human-recognizable. The previous security context and the lack of existing trust infrastructure have opened the door to man-in-the-middle attacks and evil twin attacks. Mitigating these attacks requires some degree of user involvement in the device pairing method. Previous analyzes have created a variety of technically rational strategies, hoping to be used in many human-recognizable auxiliary out-of-band channels.