Search For:

Displaying 1-20 out of 20 total
Secure Device Pairing based on a Visual Channel (Short Paper)
Found in: Security and Privacy, IEEE Symposium on
By Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
Issue Date:May 2006
pp. 306-313
<p>Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted third party. McCune, et al. [4] proposed that one device displays the ha...
 
Access Control in Ad Hoc Groups
Found in: Hot Topics in Peer-to-Peer Systems, International Workshop on
By Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
Issue Date:October 2004
pp. 2-7
<p>Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolerant computing and communication. Since such groups do not require any...
 
Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris, N. Asokan
Issue Date:March 2011
pp. 181-188
Personal RFID tags store valuable information private to their users that can easily be subject to eavesdropping, unauthorized reading, owner tracking, and cloning. RFID tags are also susceptible to relay attacks and likely to get lost and stolen. In this ...
 
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
Found in: IEEE Transactions on Mobile Computing
By Toni Perković,Mario Čagalj,Toni Mastelić,Nitesh Saxena,Dinko Begušić
Issue Date:February 2012
pp. 337-351
HASH(0x3b6160c)
 
Caveat eptor: A comparative study of secure device pairing methods
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun
Issue Date:March 2009
pp. 1-10
“Secure Device Pairing” is the process of bootstrapping a secure channel between two previously unassociated devices over a (usually wireless) human-imperceptible communication channel. Lack of prior security context and common trust infrastructure open th...
 
Pairing Devices with Good Quality Output Interfaces
Found in: Distributed Computing Systems Workshops, International Conference on
By Nitesh Saxena, Jonathan Voris
Issue Date:June 2008
pp. 382-387
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or Wi-Fi, is known as
 
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs
Found in: IEEE Transactions on Parallel and Distributed Systems
By Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
Issue Date:February 2009
pp. 158-170
Decentralized node admission is an essential and fundamental security service in mobile ad hoc networks (MANETs). It is needed to securely cope with dynamic membership and topology as well as to bootstrap other important security primitives (such as key ma...
 
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
Found in: 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)
By Hien Thi Thu Truong, Xiang Gao,Babins Shrestha,Nitesh Saxena,N. Asokan,Petteri Nurmi
Issue Date:March 2014
pp. 163-171
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user interaction. Currently deployed ZIA solutions are predominantly based on the terminal detecting the proximity of the user's person...
   
On the viability of CAPTCHAs for use in telephony systems: a usability field study
Found in: Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI '13)
By Niharika Sachdeva, Nitesh Saxena, Ponnurangam Kumaraguru
Issue Date:September 2013
pp. 178-182
Usability of security solution has always been a keen area of interest for researchers. CAPTCHA is one such security solution which presents various usability challenges for users. However, it has successfully reduced the abuse of the Internet resources, s...
     
Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures
Found in: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (WiSec '13)
By Nitesh Saxena
Issue Date:April 2013
pp. 25-30
We introduce a lightweight permission enforcement approach - Tap-Wave-Rub (TWR) - for smartphone malware prevention. TWR is based on simple human gestures (implicit or explicit) that are very quick and intuitive but less likely to be exhibited in users' da...
     
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
Found in: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (WISEC '12)
By Di Ma, Tuo Xiang, Anudath K. Prasad, Nitesh Saxena
Issue Date:April 2012
pp. 51-62
In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include acc...
     
On the limitations of query obfuscation techniques for location privacy
Found in: Proceedings of the 13th international conference on Ubiquitous computing (UbiComp '11)
By Nitesh Saxena, Sai Teja Peddinti
Issue Date:September 2011
pp. 187-196
A promising approach to location privacy is query obfuscation, which involves reporting k -- 1 false locations along with the real location. In this paper, we examine the level of privacy protection provided by the current query obfuscation techniques agai...
     
Accelerometers and randomness: perfect together
Found in: Proceedings of the fourth ACM conference on Wireless network security (WiSec '11)
By Jonathan Voris, Nitesh Saxena, Tzipora Halevi
Issue Date:June 2011
pp. 115-126
Accelerometers are versatile sensors that are nearly ubiquitous. They are available on a wide variety of devices and are particularly common on those that are mobile or have wireless capabilities. Accelerometers are applicable in a number of settings and c...
     
Pairing devices for social interactions: a comparative usability evaluation
Found in: Proceedings of the 2011 annual conference on Human factors in computing systems (CHI '11)
By Arun Kumar, Ersin Uzun, Nitesh Saxena
Issue Date:May 2011
pp. 2315-2324
When users wish to establish wireless radio communication between/among their devices, the channel has to be bootstrapped first. The process of setting up a secure communication channel between two previously unassociated devices is referred to as "Secure ...
     
On the effectiveness of anonymizing networks for web search privacy
Found in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11)
By Nitesh Saxena, Sai Teja Peddinti
Issue Date:March 2011
pp. 483-489
Web search has emerged as one of the most important applications on the internet, with several search engines available to the users. There is a common practice among these search engines to log and analyse the user queries, which leads to serious privacy ...
     
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Nitesh Saxena, Tzipora Halevi
Issue Date:October 2010
pp. 97-108
Secure "pairing" of wireless devices based on auxiliary or out-of-band (OOB) - audio, visual or tactile - communication is a well-established research direction. Lack of good quality interfaces on or physical access to certain constrained devices (e.g., he...
     
Groupthink: usability of secure group association for wireless devices
Found in: Proceedings of the 12th ACM international conference on Ubiquitous computing (Ubicomp '10)
By Ersin Uzun, Gene Tsudik, Nitesh Saxena, Rishab Nithyanand
Issue Date:September 2010
pp. 331-340
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devices) have no prior association, a new security context must be established. In...
     
Treat 'em like other devices: user authentication of multiple personal RFID tags
Found in: Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09)
By Jonathan Voris, Md. Borhan Uddin, Nitesh Saxena
Issue Date:July 2009
pp. 1-32
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need o...
     
Universal device pairing using an auxiliary device
Found in: Proceedings of the 4th symposium on Usable privacy and security (SOUPS '08)
By Jonathan Voris, Md. Borhan Uddin, Nitesh Saxena
Issue Date:July 2008
pp. 1-30
The operation of achieving authenticated key agreement between two human-operated devices over a short-range wireless communication channel (such as Bluetooth or WiFi) is referred to as "Pairing". The devices in such a scenario are ad hoc in nature, i.e., ...
     
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
Found in: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04)
By Jeong Hyun Yi, Nitesh Saxena, Stanislaw Jarecki
Issue Date:October 2004
pp. 1-9
Recently, Luo, et al. in a series of papers [17, 14, 13, 18, 15] proposed a set of protocols for providing ubiquitous and robust access control [URSA] in mobile ad hoc networks without relying on a centralized authority. The URSA protocol relies on the new...
     
 1