HOME

TheInfoList



OR:

Wireless lock is a protection concept for
authenticated Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicati ...
LAN Lan or LAN may also refer to: Science and technology * Local asymptotic normality, a fundamental property of regular models in statistics * Longitude of the ascending node, one of the orbital elements used to specify the orbit of an object in sp ...
or WLAN network clients offered from various vendors in various functional shapes and physical designs. In contrast to wireless keys, wireless lock puts emphasis on automatic locking instead of just locking by time-out or unlocking. The wireless lock concept supports initialising the client with authentication and log-on as electronic key solutions. Beyond that a wireless lock supports automatic log-off after user leaves unlocked network client and independent from time-out conditions. Protection comes into effect, while integrated or galvanically attached and paired receiver/transceiver stays connected with protected client object as soon as wireless token gets separated from client exceeding a set maximum allowed distance, generally the manual reach required for operating
keyboard Keyboard may refer to: Text input * Keyboard, part of a typewriter * Computer keyboard ** Keyboard layout, the software control of computer keyboards and their mapping ** Keyboard technology, computer keyboard hardware and firmware Music * Musi ...
attached to client. Currently (2011-07) there is no general standard supporting inter-operability of wireless lock concepts. * Most offered air interface solution is based on ISO/IEC 18000-3 HF (13,56 MHz) passive
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromag ...
tags and near field communication (NFC)-like reader specification. * Most offered authentication procedures make use of IETF
public key infrastructure A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilit ...
(PKI). * Comfortable solutions support single sign-on servicing. * Bluetooth BLE profile ''proximity'' is said to support such application.


Usage principles

The wireless token serves as an independent second authentication factor. Local pairing of token with protected networked client object is the authentication procedure. Personalisation of token with user is a preparative action that may be administered apart from network. Allocated user credentials shall be served from networked authorisation server for allowed access to data and function and from authentication server for allowed access to network and clients. A wireless communication distance metrics sets the protected object to "locked", as soon as the set distance level between paired transmitter and receiver of a wireless signal transmission is exceeded. The protected object returns to status "unlocked" as soon as the distance gets lesser and the received signal strength level higher than set limit. Transmitters may be worn by the owner of an object, whereas the other receiver item gets attached to the protected object for logically protecting it to usage by the owner only. Basic electronic gadget is a wireless token that communicates with a counterpart attached to the object to be controlled wirelessly. User guides for mode of operation recommend to bear a very light designed alarm token with a necklace, a wristband or similarly directly bound to the body. Very low transmission power levels secure low electromagnetic interference as well as entirely biologically harmless operation After setting the object to protect to work and initially pairing the two wireless token devices with each other, the protected object refuses operation when exceeding the set distance between token and protected object. Advanced solutions offer communications on the basis of standardized communication protocols and based on standardized air interface links. Simple solutions make use of passive RFID tokens, thus requiring a higher transmission level from a reader attached to the protected object and illuminating the token for response. Chosen frequency band and allowed maximum transmission power level define the possible reach for the response from the token in the vicinity of the protected object.


Applications

Application is mainly known PC locking under for authenticated log-in conditions. Protected object controlling works with the token at hands working as a transceiver (RFID passive) or beacon transmitter (RFID active. Currently some similar applications are offered by several no-name vendors and under non-guaranteed specification.


Standardization

Relevant existing standard for such application is Bluetooth V4.0 Low Energy of 2009-12-17 with the profiles ''Find Me'' and ''Proximity''.


Security modes

Published concepts for secure key transmission are published in several context. Standardisation in IETF (
PKI PKI may refer to: * Partai Komunis Indonesia, the Communist Party of Indonesia * Peter Kiewit Institute The Peter Kiewit Institute is a facility in Omaha, Nebraska, United States which houses academic programs from the University of Nebraska� ...
),
W3C The World Wide Web Consortium (W3C) is the main international standards organization for the World Wide Web. Founded in 1994 and led by Tim Berners-Lee, the consortium is made up of member organizations that maintain full-time staff working to ...
( XML),
ITU The International Telecommunication Union is a specialized agency of the United Nations responsible for many matters related to information and communication technologies. It was established on 17 May 1865 as the International Telegraph Unio ...
( X.509) is going on. Basically there are different concepts available for implementing a sound security concept: * Active token sends fixed identity to be read by receiver (not robust against attacks) * Transceiver sends initial code in challenge–response procedure and active token answers agreed code to prevent from fraudulent attacking * Transceiver sends with varied power levels to stimulate various response levels from passive tag * Transceiver and token communicate bi-directional for travel time ( time of flight, TOF) estimates * Beaconing token sends with varied power levels to support
RSSI In telecommunications, received signal strength indicator (RSSI) is a measurement of the Electric power, power present in a received radio signal. RSSI is usually invisible to a user of a receiving device. However, because signal strength can var ...
estimation with receiver


Metrics options

The metrics options for detecting separation of protected object and authenticated user have to take into account various physical phenomena and thus offer a variety of signal processing to overcome * multipath propagation * indirect and direct paths * multipath fading * excess reach of nearby colliding transmitters * higher populations of transmitters The safe approach is travel time estimation with ultra-short pulses (e.g. UWB and
CSS Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language such as HTML or XML (including XML dialects such as SVG, MathML or XHTML). CSS is a cornerstone techno ...
), the cheap approach is RSSI estimate with just variation of power levels.


Standards based products available

Many current product offers with reference to communication standards are just prototypes. Basic design is proposed e.g. with Texas Instruments sample offer using Bluetooth V4.0 low energy protocol standard and with comparable proposals of other chip foundries.


Critics

Currently (2011-07) there is no certified product according to ISO/IEC 15408 security requirements on offer. However any workable solution is better than nothing compared to logged-in work positions left unobserved.


Freeware implementation

Well known implementation is Linux and Windows available ''BlueProximity'' solution. The hosting on PC like systems allows for detecting presence of mobile phones in proximity to PC-attached Bluetooth dongle or equivalent interface. PC gets locked on leave. Reported and other simple deficiencies of this solution are: * just local locking logically independent of other security means * wide variety of overall receiver sensitivity and RSSI feedback dynamics * wide variety of transmitter efficiency adjusting to RSSI feedback * varying lock-up distance with any combination of transmitter and receiver * manual setting the pairing of mobile phone and PC interface * no integration to network authentication and authorisation management * no integration to user role management and access credentials for application access * lack of protection against MIM attacking and other relevant attacking concepts However this Bluetooth based approach is the best protected solution compared to other proprietary approaches without means comparable to mobile phone SIM locking or to Bluetooth link protection.


Advantages

Basic infrastructure requirements with wireless locking are very low. There are no additional server function requirements beyond public key infrastructure standards. The infrastructure requirement to include wireless receiver to protected objects via integration or using dongles is state-of-the-art. All tampering may be detected automatically. Attachment of receiver/transmitter in
dongle A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality. In computing, the term was initially synonym ...
shaping to protected object is easily made via USB port. Small security application will make use of protection mechanisms of operating system of protected object. Neither dongle nor protected unit may be compromised as long as any tampering of security application gets detected. Major advantage with wireless locking comes with automating log-off. Hence common lacking of caution by mobile users may be entirely compensated. Automatic wireless authentication factors do not require any handling. The only requirement to the user just to wear a token without any keying is unsurpassed in comfort and functional value. Wireless locking provides additional security for networks against fraudulent access and usage. Reported security deficits with second factor authentication may be compensated by reducing all burdens with keeping, handling and wearing such factors. Transmission power of the wireless token for the object may be very low in the 1 mW range, as just the distance between the bearer and the item to be protected shall be bridged. That is a level causing no harm in any environment nor electromagnetic interference to sensitive may occur, i.e. interference with medical devices may be neglected. Wireless locking offers best robustness against de-authentication attacks. Continuous connection based encrypted key exchange between active token and receiver dongle provides a sufficient security level prepared for certification under
ISO/IEC 15408 ISO/IEC JTC 1, entitled "Information technology", is a joint technical committee (JTC) of the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Its purpose is to develop, maintain and pr ...
common criteria The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification. It is currently in version 3.1 revision 5. Common Criteria ...
specification. Initially connection based encrypted key exchange serves for a lower security level which appears sufficient for most requirements.


Disadvantages

All known approaches for wireless locking are either proprietary or just industrial standard, as e.g. ZigBee, ANT or other communication platforms, hence requiring special pairing of token and receiver/transmitter resp. Adherence to wireless air interface standards and wireless communications protocols compensates for such top level standardisation gap. Unidirectional communication between beaconing token and receiver dongle may be hacked with Man-in-the-middle attack.Bruce Schneier on security: Hacking Two-Factor Authentication
/ref> However, connection based challenge–response initialisation serves a much higher security level. Clear specification of battery wear is not published with all known vendors' offerings.


See also


Transmission concepts

* Bluetooth *
Bluetooth low energy Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications in ...
* Near Field Communication * Wireless PAN *
Public Key Infrastructure A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilit ...
* Smart key *
WBAN WBAN (1340 AM broadcasting, AM) is a radio station broadcasting an adult contemporary format. Licensed to Veazie, Maine, United States, the station serves the Bangor area. The station is owned by Port Broadcasting, LLC, and features programmi ...
* WLAN * IEEE 802.11 *
IEEE 802.15.1 Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limit ...
*
IEEE 802.16 IEEE 802.16 is a series of wireless broadband standards written by the Institute of Electrical and Electronics Engineers (IEEE). The IEEE Standards Board established a working group in 1999 to develop standards for broadband for wireless metrop ...


References

{{DEFAULTSORT:Fuzzy Locating System Radio-frequency identification Tracking Ubiquitous computing Wireless locating