Smart Societies, Infrastructure, Technologies and Applications. First International Conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings

Research Article

Secure Communication Protocol Between Two Mobile Devices Over Short Distances

Download
160 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-94180-6_9,
        author={Muhammad Khan and Farhana Chowdhury and Zarmina Jahangir and Francis Ofougwuka},
        title={Secure Communication Protocol Between Two Mobile Devices Over Short Distances},
        proceedings={Smart Societies, Infrastructure, Technologies and Applications. First International Conference, SCITA 2017, Jeddah, Saudi Arabia, November 27--29, 2017, Proceedings},
        proceedings_a={SCITA},
        year={2018},
        month={7},
        keywords={Software security Security NFC Bluetooth Secure communications protocol},
        doi={10.1007/978-3-319-94180-6_9}
    }
    
  • Muhammad Khan
    Farhana Chowdhury
    Zarmina Jahangir
    Francis Ofougwuka
    Year: 2018
    Secure Communication Protocol Between Two Mobile Devices Over Short Distances
    SCITA
    Springer
    DOI: 10.1007/978-3-319-94180-6_9
Muhammad Khan1,*, Farhana Chowdhury2,*, Zarmina Jahangir1,*, Francis Ofougwuka3,*
  • 1: Riphah International University
  • 2: Centennial College
  • 3: Royal Bank of Canada
*Contact email: umair@cs.queensu.ca, fchowdh3@my.centennialcollege.ca, zarmina.jahangir@riphah.edu.pk, francid81@gmail.com

Abstract

The security of mobile devices has become a significant issue with the increase in data and computing capacities. Such devices store security critical data such as passwords to various online services. In the event of theft of such devices, the user’s credentials are at the mercy of the attacker. A secondary mobile device may be used to lock the primary mobile device if the distance between the two is larger than a specified threshold. Such proximity-based locking devices use Bluetooth and NFC technologies to communicate with the primary devices. In this paper, we propose an authentication protocol that can be used between two such mobile devices which use NFC and Bluetooth. The protocol elaborates a number of possible scenarios and how they should be implemented to maximize security of the mobile devices. The proposed protocol has been implemented and tested on Android and iOS devices.