Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication

© 2016, IGI Global. The use of smartphone is pervasive. With device pocketability driving user engagement throughout the day, it is highly probable that smartphones will replace daily items (e.g., keys and credit cards) that people now carry around. The idea presented here is a significant step in t...

Full description

Bibliographic Details
Main Authors: Teh, P., Ling, Huo Chong, Cheong, S., Ahmed, P.
Format: Book Chapter
Published: 2015
Online Access:http://hdl.handle.net/20.500.11937/72073
_version_ 1848762652137881600
author Teh, P.
Ling, Huo Chong
Cheong, S.
Ahmed, P.
author_facet Teh, P.
Ling, Huo Chong
Cheong, S.
Ahmed, P.
author_sort Teh, P.
building Curtin Institutional Repository
collection Online Access
description © 2016, IGI Global. The use of smartphone is pervasive. With device pocketability driving user engagement throughout the day, it is highly probable that smartphones will replace daily items (e.g., keys and credit cards) that people now carry around. The idea presented here is a significant step in this direction. This chapter details the authors' design and development of a smartphone access control system using Near Field Communication (NFC) Encrypted Steganography Graphical Password (ESGP). The primary objective is to leverage the technical capability of NFC-enabled smartphones in developing a two-factor authentication system connecting physical resources (i.e., premises) and virtual resources (i.e., password knowledge). This involves a novel integration of token-based, graphical-password authentication, cryptography and steganography. The second objective is to evaluate users' behavior intention to use the system. New insights for researchers and business world interested in the unified solutions for NFCcompatible smartphone, access control and mobile security are provided.
first_indexed 2025-11-14T10:50:58Z
format Book Chapter
id curtin-20.500.11937-72073
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T10:50:58Z
publishDate 2015
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-720732018-12-13T09:33:30Z Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication Teh, P. Ling, Huo Chong Cheong, S. Ahmed, P. © 2016, IGI Global. The use of smartphone is pervasive. With device pocketability driving user engagement throughout the day, it is highly probable that smartphones will replace daily items (e.g., keys and credit cards) that people now carry around. The idea presented here is a significant step in this direction. This chapter details the authors' design and development of a smartphone access control system using Near Field Communication (NFC) Encrypted Steganography Graphical Password (ESGP). The primary objective is to leverage the technical capability of NFC-enabled smartphones in developing a two-factor authentication system connecting physical resources (i.e., premises) and virtual resources (i.e., password knowledge). This involves a novel integration of token-based, graphical-password authentication, cryptography and steganography. The second objective is to evaluate users' behavior intention to use the system. New insights for researchers and business world interested in the unified solutions for NFCcompatible smartphone, access control and mobile security are provided. 2015 Book Chapter http://hdl.handle.net/20.500.11937/72073 10.4018/978-1-4666-9438-5.ch013 restricted
spellingShingle Teh, P.
Ling, Huo Chong
Cheong, S.
Ahmed, P.
Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
title Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
title_full Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
title_fullStr Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
title_full_unstemmed Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
title_short Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication
title_sort mobile embedded system: your door key evolved with your smartphone - a user evaluation of a two-factor authentication
url http://hdl.handle.net/20.500.11937/72073