Full Text:   <1776>

CLC number: TP311

On-line Access: 2008-04-17

Received: 2007-09-25

Revision Accepted: 2008-01-16

Crosschecked: 0000-00-00

Cited: 3

Clicked: 3368

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE A 2008 Vol.9 No.6 P.770~775

10.1631/jzus.A071516


Bluetooth-based authentication system for ambient intelligence


Author(s):  Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG

Affiliation(s):  School of Software Engineering, Beijing University of Technology, Beijing 100022, China; more

Corresponding email(s):   Jianhee@bjut.edu.cn

Key Words:  Bluetooth, Ambient Intelligence (AmI), Authentication


Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG. Bluetooth-based authentication system for ambient intelligence[J]. Journal of Zhejiang University Science A, 2008, 9(6): 770~775.

@article{title="Bluetooth-based authentication system for ambient intelligence",
author="Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG",
journal="Journal of Zhejiang University Science A",
volume="9",
number="6",
pages="770~775",
year="2008",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.A071516"
}

%0 Journal Article
%T Bluetooth-based authentication system for ambient intelligence
%A Jian HE
%A Hui LI
%A Yong ZHANG
%A Zhang-qin HUANG
%J Journal of Zhejiang University SCIENCE A
%V 9
%N 6
%P 770~775
%@ 1673-565X
%D 2008
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.A071516

TY - JOUR
T1 - Bluetooth-based authentication system for ambient intelligence
A1 - Jian HE
A1 - Hui LI
A1 - Yong ZHANG
A1 - Zhang-qin HUANG
J0 - Journal of Zhejiang University Science A
VL - 9
IS - 6
SP - 770
EP - 775
%@ 1673-565X
Y1 - 2008
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.A071516


Abstract: 
According to the requirement of natural human-computer interaction for ambient Intelligence (AmI), a bluetooth-based authentication technique is provided. An authentication network combining advantages of bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a bluetooth badge for storing the user’s identification information. Finally, the authentication system based on bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the bluetooth-based authentication technique can authenticate the user automatically.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1] Bray, J., Sturman, C.F., 2002. Bluetooth: Connect without Cables (2nd Ed.). Prentice Hall PTR, Upper Saddle River, New Jersey.

[2] Chatschik, B., 2001. An overview of the Bluetooth wireless technology. IEEE Commun. Mag., 39(12):86-94.

[3] Chen, R., Li, H., 2005. Facial Orientation Analysis and Application in Human-Computer Interactive System— Convergence of Computing Technologies in the New Era. Proc. 8th Int. Conf. for Young Computer Scientists. Beijing, p.553-560.

[4] CSR (Cambridge Silicon Radio Ltd.), 2006. BlueCore2-External Product Data Book. Http://www.csrsupport.com/CSR/Data Sheets/BlueCore2-External Data Sheet/262_BlueCore2-External Data Book.pdf

[5] Ding, Z.B., 2005. Research and Implementation of Bluetooth Based Authentication System in Ambient Intelligent. MS Thesis, Xi’an Jiaotong University, Xi’an, China (in Chinese).

[6] Ducatel, K., Bogdanowicz, M., Scapolo, F., Leijten, J., Burgel-man, J.C., 2000. Scenarios for Ambient Intelligence in 2010. Http://www.philips.co.kr/Assets/Downloadablefile/eur19763en-1505.pdf

[7] Gui, J.H., Zhang, H.S., 2002. Security resolution of Bluetooth. Computer Appl., 22(10):12-17 (in Chinese).

[8] Hagras, H., Callaghan, V., Colley, M., Clarke, G., Pounds-Cornish, A., Duman, H., 2004. Creating an ambient-intelligence environment using embedded agents. IEEE Intell. Syst., 19(6):12-20.

[9] Han, J.H., Duan, L.L., Zhang, J.J., Wang, J.H., 2004. Development of Bluetooth subsystem of embedded information appliance system. J. Syst. Simul., 16(12):2825-2827 (in Chinese).

[10] Li, T., Ou, Z.Y., 2000. Development and application of individual feature based authentication technique. Computer Eng., 26(12):69-70 (in Chinese).

[11] Li, Z.X., Zhan, B.H., Yang, Y.X., 1999. Development of authentication theory and technique. Chin. J. Electr., 27(1):98-102 (in Chinese).

[12] Naqvi, S., Riguidel, M., 2004. Security Architecture for Heterogeneous Distributed Computing Systems. Proc. 38th Annual Int. Carnahan Conf. on Security Technology, p.34-41.

[13] Wang, C.L., 2003. Study on Bluetooth security. J. Shandong Univ. Sci. Technol. (Nat. Sci.), 22(4):61-64 (in Chinese).

[14] Weber, W., 2003. Ambient Intelligence—Industrial Research on a Visionary Concept. Proc. Int. Symp. on Low Power Electronics and Design, p.247-251.

[15] Zhang, Y., Hou, Y.B., Huang, Z.Q., Li, H., Chen, R., 2006. A Context-Aware AmI System Based on MAS Model. Intelligent Int. Conf. on Intelligent Information Hiding and Multimedia, p.703-706.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE