Out-of-band authentication systems

Tomasz Bilski


tandard communication channels based on radio waves may not be considered safe. Signals that user receives may come from different places, which may be hidden. User is not able to determine the source of the signals. This may be used by illegitimate users to spoof or to sniff wireless channel. In order to authenticate the sender’s wireless device one has to use additional out-of-band channel. The paper is a survey of out-of-band authentication methods and systems. Standards, theoretical works as well as commercial solutions have been presented.


wireless networks; authentication; out-of-band authentication; key exchange; man in the middle attacks; ephemeral pairing problem

Full Text:

PDF (Polski)


Ahson M., Ilyas S. A.: Near Field Communications Handbook. Auerbach Publications 2011.

Balfanz D., Smetters D., Stewart P., Wong H.C.: Talking to strangers: authentication in ad-hoc wireless networks. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS), 2002, s. 23–35.

Berman S. et al.: Human Electroretinogram Responses to Video Displays. Fluorescent Lighting and Other High Frequency Sources, Optometry and Vision Science, vol. 68, 1991,

s. 645–62.

Bichler D., Stromberg G., Huemer M., Löw M.: Key Generation Based on Acceleration Data of Shaking Processes, J. Krumm et al. (Eds.): UbiComp 2007, LNCS 4717, Springer Verlag, Berlin Heidelberg 2007, s. 304–317.

Bilski T.: Data Security in Emerging Wireless Technologies, Information Systems Architec-ture and Technology – Networks Architecture and Aplications, [Editors L. Borzemski,

A. Grzech, J. Świątek, Z. Wilimowska], Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław 2013, s. 119–128.

Bilski T.: New Threats and Innovative Protection Methods in Wireless Transmission Sys-tems. Journal of Telecommunications and Information Technology, Instytut Łączności, 3 numer 2014 roku (zgłoszono do druku).

Goodrich M.T., Sirivianos M., Solis J., Tsudik G., Uzun, E.: Loud and clear: human-verifiable authentication based on audio, Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2006, s. 1–10.

Kortvedt H., Mjolsnes S.: Eavesdropping Near Field Communication. The Norwegian In-formation Security Conference (NISK), Listopad 2009.

Laur S., Nyberg K.: Efficient mutual data authentication using manually authenticated strings. Proceedings of Cryptology and Network Security (CANS), 2006, s. 90–107.

Madhavapeddy A., Scott D., Sharp R., Upton, E.: Using visual tags to bypass Bluetooth device discovery. Proceedings of the ACM Mobile Computing and Communications Re-view (MC2R), 2005, s. 41–53.

Martinovic I., Gollan N., Cappellaro L., Schmitt J.: Chaotic communication improves au-thentication: protecting WSNs against injection attacks. Security and Communication Net-works, Security Comm. Networks, Wiley, 2009, s. 117–132.

Martinovic I., Pichota P., Schmitt J.B.: Jamming for Good: A Fresh Approach to Authentic Communication in WSNs, WiSec’09 Zurich, March 16–18, 2009.

Mayrhofer R., Welch M.: A Human-Verifiable Authentication Protocol Using Visible Laser Light. Second International Conference on Availability, Reliability and Security (ARES’07), 2007.

McCune J. M., Perrig A., Reiter M. K., Seeing-Is-Believing: Using Camera Phones for Hu-man-Verifiable Authentication, International Journal of Security and Networks Special Issue on Secure Spontaneous Interaction. 4(1-2), 2009, s. 43–56.

Nandakumar R., Chintalapudi K. K., Padmanabhan V. N., Venkatesan R., Dhwani: Secure Peer-to-Peer Acoustic NFC, SIGCOMM’13, August 12–16, Hong Kong 2013, http://research.microsoft.com/pubs/192134/Paper325Dhwani.pdf

Premnath S. N, Jana S., Croft J., Gowda P. L., Clark M., Kasera S. K., Patwari N., Krish-namurthy S.V., Secret Key Extraction from Wireless Signal Strength in Real Environments, IEEE Transactions on Mobile Computing, Vol. 12, No. 5, May 2013, s. 917–930.

Rajagopal S., Roberts R.D., Lim S-K.: 802.15.7 Visible Light Communication: Modulation Schemes and Dimming Support, IEEE Communications Magazine, March 2012, s. 72–82.

DOI: http://dx.doi.org/10.21936/si2014_v35.n3.697