The traditional authentication mechanism used for
a standalone or shared system is through Alphanumeric or
Graphical passwords. Typical threats to passwords include
Guessing, Offline Dictionary attacks, Spoofing, Shoulder
Surfing and Social engineering or pretexting. Even when the
Graphical passwords are used the accuracy, computational
and storage overheads prohibit the use of this type of
passwords, especially for low cost end user systems. We
propose a technique, using Bluetooth technology on smart
phones, to not only authenticate the user on a shared system,
but also ensure that his / her data is safe (in encrypted form)
when he / she is not accessing it. The data gets automatically
decrypted when the user is within the range of the system.
Another novel feature includes remote notification on system
access when the user is outside the range (not in the vicinity)
of the system. This feature enables the user to have total
control of the system, as the user is made aware of the system
access in his or her absence. We think this feature is extremely
relevant for shared as well as unshared system holding
sensitive data. Thus, the proposed work provides
Authentication, Data Confidentiality and Remote access
notification to the user working on a shared or unshared
system.
D.S. Adane : Department of Information Technology,
ShriRamdeobaba College of Engineering and Management,
Nagpur, India
Anuja Fole : Department of Information Technology,
ShriRamdeobaba College of Engineering and Management,
Nagpur, India
Megha Rajput : Department of Information Technology,
ShriRamdeobaba College of Engineering and Management,
Nagpur, India
Ajay Kabra : Department of Information Technology,
ShriRamdeobaba College of Engineering and Management,
Nagpur, India
Anurag Tomar : Department of Information Technology,
ShriRamdeobaba College of Engineering and Management,
Nagpur, India
Authentication, Confidentiality, Bluetooth,
Remote Access, Encryption, Security, Shared System
The text based passwords are always vulnerable to bruteforce
attack, Dictionary attack, and key loggers. Our
proposed solution doesn’t use text password for
authentication, rather our system uses Bluetooth address of
users to authenticate them thus,eliminating all the attacks
discussed above. To ensure that two legimate users don’t
have access to each others directories or files, we are using
Bluetooth addresses as the key for encryption thus
directory contents of one user can’t be decrypted by any
other user’s Bluetooth address. Systems which are shared
between users of organization or family members at home
need more security than personal systems, hence, using
Bluetooth authentication alone isn’t sufficient thus our
solution include remote administration application for
owner or administrator who can control the remote system
via android application that we have designed. Our system
is ideal for environment where there is need of system
which allows multiple user to store and retrieve data
securely. The existing system can be extended by
addingfunctionality like Remote Desktop sharing, file
transfer and optimization of system.
[1] Mrs.ArunaGawde, SanchitJaina ,MohsinMasanib,
SahilDeliwala“Securing Computer Device Using
Bluetooth technology and One-Time
Password”,International Journal Of Engineering And
Computer Science ISSN:2319-7242 Volume 4 Issue 4
April 2015, Page No. 11426-11429.
[2] A.V.Nadargi, ApurvaDalmiya, SonaliJadhav, Gajendra
Singh Solanki, “Study of Securing Computer Folders
with Bluetooth”, International Advanced Research
Journal in Science, Engineering and Technology,Vol.
2, Issue 2, February 2015.
[3] NikitaSaple, DhanrajPoojari ,AnkitaKesarkar and
AlkaSrivastava , “Securing Computer Folders using
Bluetooth and RijndaelEncryption”, International
Journal of Current Engineering and Technology, Vol.5,
No.1 (Feb 2015)
[4] Wankhade S.B., Damani A.G., Desai S.J.,
KhanapureA.V.”An Innovative Approach to File
Security Using Bluetooth International Journal of
Scientific Engineering and Technology Volume No.2,
Issue No.5, PP: 417-423, 1 May 2013.
[5] Nishant Mishra, Vishal. Gupta.“An overview of
bluetooth security: issues and challenges”, Journal of
Global Research in Computer Science, Volume 3, No.
3, March 2012.
[6] DhanrajPoojari, AnkitaKesarkar, Nikita Saple and
AlkaSrivastava. “Improving Security for Folders in
Windows by using Bluetooth and Rijndael
Encryption”, International Journal of Current
Engineering and Technology, Vol.5, No.2 (April 2015)
[7] S. Pavithra and Mrs. E. Ramadevi.“Performance
evaluation of symmetric algorithms”,Journal of Global
Research in Computer Science, Volume 3, No. 8,
August 2012.
[8] www.aesencryption.net
[9] www.bluecove.org/bluecove/apidocs/overviewsummary.
html#Device Discovery