CLC number: TP311
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 0000-00-00
Cited: 3
Clicked: 5982
Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG. Bluetooth-based authentication system for ambient intelligence[J]. Journal of Zhejiang University Science A, 2008, 9(6): 770-775.
@article{title="Bluetooth-based authentication system for ambient intelligence",
author="Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG",
journal="Journal of Zhejiang University Science A",
volume="9",
number="6",
pages="770-775",
year="2008",
publisher="Zhejiang University Press & Springer",
doi="10.1631/jzus.A071516"
}
%0 Journal Article
%T Bluetooth-based authentication system for ambient intelligence
%A Jian HE
%A Hui LI
%A Yong ZHANG
%A Zhang-qin HUANG
%J Journal of Zhejiang University SCIENCE A
%V 9
%N 6
%P 770-775
%@ 1673-565X
%D 2008
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.A071516
TY - JOUR
T1 - Bluetooth-based authentication system for ambient intelligence
A1 - Jian HE
A1 - Hui LI
A1 - Yong ZHANG
A1 - Zhang-qin HUANG
J0 - Journal of Zhejiang University Science A
VL - 9
IS - 6
SP - 770
EP - 775
%@ 1673-565X
Y1 - 2008
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.A071516
Abstract: According to the requirement of natural human-computer interaction for ambient Intelligence (AmI), a bluetooth-based authentication technique is provided. An authentication network combining advantages of bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a bluetooth badge for storing the user’s identification information. Finally, the authentication system based on bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the bluetooth-based authentication technique can authenticate the user automatically.
[1] Bray, J., Sturman, C.F., 2002. Bluetooth: Connect without Cables (2nd Ed.). Prentice Hall PTR, Upper Saddle River, New Jersey.
[2] Chatschik, B., 2001. An overview of the Bluetooth wireless technology. IEEE Commun. Mag., 39(12):86-94.
[3] Chen, R., Li, H., 2005. Facial Orientation Analysis and Application in Human-Computer Interactive System— Convergence of Computing Technologies in the New Era. Proc. 8th Int. Conf. for Young Computer Scientists. Beijing, p.553-560.
[4] CSR (Cambridge Silicon Radio Ltd.), 2006. BlueCore2-External Product Data Book. Http://www.csrsupport.com/CSR/Data Sheets/BlueCore2-External Data Sheet/262_BlueCore2-External Data Book.pdf
[5] Ding, Z.B., 2005. Research and Implementation of Bluetooth Based Authentication System in Ambient Intelligent. MS Thesis, Xi’an Jiaotong University, Xi’an, China (in Chinese).
[6] Ducatel, K., Bogdanowicz, M., Scapolo, F., Leijten, J., Burgel-man, J.C., 2000. Scenarios for Ambient Intelligence in 2010. Http://www.philips.co.kr/Assets/Downloadablefile/eur19763en-1505.pdf
[7] Gui, J.H., Zhang, H.S., 2002. Security resolution of Bluetooth. Computer Appl., 22(10):12-17 (in Chinese).
[8] Hagras, H., Callaghan, V., Colley, M., Clarke, G., Pounds-Cornish, A., Duman, H., 2004. Creating an ambient-intelligence environment using embedded agents. IEEE Intell. Syst., 19(6):12-20.
[9] Han, J.H., Duan, L.L., Zhang, J.J., Wang, J.H., 2004. Development of Bluetooth subsystem of embedded information appliance system. J. Syst. Simul., 16(12):2825-2827 (in Chinese).
[10] Li, T., Ou, Z.Y., 2000. Development and application of individual feature based authentication technique. Computer Eng., 26(12):69-70 (in Chinese).
[11] Li, Z.X., Zhan, B.H., Yang, Y.X., 1999. Development of authentication theory and technique. Chin. J. Electr., 27(1):98-102 (in Chinese).
[12] Naqvi, S., Riguidel, M., 2004. Security Architecture for Heterogeneous Distributed Computing Systems. Proc. 38th Annual Int. Carnahan Conf. on Security Technology, p.34-41.
[13] Wang, C.L., 2003. Study on Bluetooth security. J. Shandong Univ. Sci. Technol. (Nat. Sci.), 22(4):61-64 (in Chinese).
[14] Weber, W., 2003. Ambient Intelligence—Industrial Research on a Visionary Concept. Proc. Int. Symp. on Low Power Electronics and Design, p.247-251.
[15] Zhang, Y., Hou, Y.B., Huang, Z.Q., Li, H., Chen, R., 2006. A Context-Aware AmI System Based on MAS Model. Intelligent Int. Conf. on Intelligent Information Hiding and Multimedia, p.703-706.
Open peer comments: Debate/Discuss/Question/Opinion
<1>