Abstract
According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth-based authentication technique is provided. An authentication network combining advantages of Bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a Bluetooth badge for storing the user’s identification information. Finally, the authentication system based on Bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the Bluetooth-based authentication technique can authenticate the user automatically.
Similar content being viewed by others
References
Bray, J., Sturman, C.F., 2002. Bluetooth: Connect without Cables (2nd Ed.). Prentice Hall PTR, Upper Saddle River, New Jersey.
Chatschik, B., 2001. An overview of the Bluetooth wireless technology. IEEE Commun. Mag., 39(12):86–94. [doi:10.1109/35.968817]
Chen, R., Li, H., 2005. Facial Orientation Analysis and Application in Human-Computer Interactive System—Convergence of Computing Technologies in the New Era. Proc. 8th Int. Conf. for Young Computer Scientists. Beijing, p.553–560.
CSR (Cambridge Silicon Radio Ltd.), 2006. BlueCore2-External Product Data Book. http://www.csrsupport.com/CSR/Data Sheets/BlueCore2-External Data Sheet/262_BlueCore2-External Data Book.pdf.
Ding, Z.B., 2005. Research and Implementation of Bluetooth Based Authentication System in Ambient Intelligent. MS Thesis, Xi’an Jiaotong University, Xi’an, China (in Chinese).
Ducatel, K., Bogdanowicz, M., Scapolo, F., Leijten, J., Burgelman, J.C., 2000. Scenarios for Ambient Intelligence in 2010. http://www.philips.co.kr/Assets/Downloadablefile/eur19763en-1505.pdf
Gui, J.H., Zhang, H.S., 2002. Security resolution of Bluetooth. Computer Appl., 22(10):12–17 (in Chinese).
Hagras, H., Callaghan, V., Colley, M., Clarke, G., Pounds-Cornish, A., Duman, H., 2004. Creating an ambient-intelligence environment using embedded agents. IEEE Intell. Syst., 19(6):12–20. [doi:10.1109/MIS.2004.61]
Han, J.H., Duan, L.L., Zhang, J.J., Wang, J.H., 2004. Development of Bluetooth subsystem of embedded information appliance system. J. Syst. Simul., 16(12):2825–2827 (in Chinese).
Li, T., Ou, Z.Y., 2000. Development and application of individual feature based authentication technique. Computer Eng., 26(12):69–70 (in Chinese).
Li, Z.X., Zhan, B.H., Yang, Y.X., 1999. Development of authentication theory and technique. Chin. J. Electr., 27(1):98–102 (in Chinese).
Naqvi, S., Riguidel, M., 2004. Security Architecture for Heterogeneous Distributed Computing Systems. Proc. 38th Annual Int. Carnahan Conf. on Security Technology, p.34–41. [doi:10.1109/CCST.2004.1405366]
Wang, C.L., 2003. Study on Bluetooth security. J. Shandong Univ. Sci. Technol. (Nat. Sci.), 22(4):61–64 (in Chinese).
Weber, W., 2003. Ambient Intelligence—Industrial Research on a Visionary Concept. Proc. Int. Symp. on Low Power Electronics and Design, p.247–251.
Zhang, Y., Hou, Y.B., Huang, Z.Q., Li, H., Chen, R., 2006. A Context-Aware AmI System Based on MAS Model. Intelligent Int. Conf. on Intelligent Information Hiding and Multimedia, p.703–706. [doi:10.1109/IIH-MSP.2006.265098]
Author information
Authors and Affiliations
Corresponding author
Additional information
Project supported by the National Natural Science Foundation of China (No. 60773186), and the Science and Technology Research Foundation of the Beijing Municipal Education Commission of China (No. KM200710005018)
Rights and permissions
About this article
Cite this article
He, J., Li, H., Zhang, Y. et al. Bluetooth-based authentication system for ambient intelligence. J. Zhejiang Univ. Sci. A 9, 770–775 (2008). https://doi.org/10.1631/jzus.A071516
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1631/jzus.A071516