Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2008, Vol. 9 Issue (6): 770-775    DOI: 10.1631/jzus.A071516
Electrical & Electronic Engineering     
Bluetooth-based authentication system for ambient intelligence
Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG
School of Software Engineering, Beijing University of Technology, Beijing 100022, China; College of Computer Science, Beijing University of Technology, Beijing 100022, China; College of Electronic Information and Automation, Tianjin University of Science and Technology, Tianjin 300222, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  According to the requirement of natural human-computer interaction for Ambient Intelligence (AmI), a Bluetooth-based authentication technique is provided. An authentication network combining advantages of Bluetooth ad hoc network with the Ethernet is introduced first in detail. Then we propose a Bluetooth badge for storing the user’s identification information. Finally, the authentication system based on Bluetooth badge and authentication network is introduced. It is demonstrated experimentally that the Bluetooth-based authentication technique can authenticate the user automatically.

Key wordsBluetooth      Ambient Intelligence (AmI)      Authentication     
Received: 25 September 2007      Published: 17 April 2008
CLC:  TP311  
Cite this article:

Jian HE, Hui LI, Yong ZHANG, Zhang-qin HUANG. Bluetooth-based authentication system for ambient intelligence. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(6): 770-775.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.A071516     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2008/V9/I6/770

[1] Ning CHEN, Jie ZHU. Multipurpose audio watermarking algorithm[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(4): 517-523.
[2] KULESZA Kamil, KOTULSKI Zbigniew. On ASGS framework: general requirements and an example of implementation[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(4 ): 1-.
[3] Chen Zhi-kui. An adaptive FEC to protect RoHC and UDP-Lite H.264 video critical data[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(5 ): 28-.
[4] JIANG Jun, HE Chen. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 8-.