As mentioned before, in the area of physical
security, NTT DoCoMo, offers a phone that
automatically locks itself down when its owner
moves beyond a certain distance (Kageyama 2006).
The cell phone comes with a small black security
card, about the size of a movie-ticket stub, which the
cell phone can sense its adjacent presence. If an
owner keeps the card in a bag or pocket, the phone
recognizes when the card moves too far away and
locks automatically to prevent someone from
making a call. Face recognition, satellite tracking
are other security feature in this type of cell phone,
which can also be used as a credit or a prepaid cash
card. Having such a phone makes the SoonR
experience safer, but it doesn’t eliminate the need
for on-demand connection and one-time password
mechanism. From the other hand, not only this
solution has its own shortcomings, there are many
cell phones out there without this type of
protections. However the idea of distance detection
in this cell phone is close to what we suggest for
disabling SoonR Desktop Agent when the cell phone
is in vicinity of the computer.
9 CONCLUSIONS
This paper demonstrates that it is feasible to improve
the deterrence against security threats in an off-the-
shelf product. The product chosen to make this
point, SoonR, is representative of an emerging class
of commercial products for accessing remote PCs
using a cell phone. Specifically, the proposed
enhancements consist of:
− Reducing the window of exposure to threats by
granting remote access to the user’s PC only
when required, instead of supporting the current
always-on policy.
− Reducing the likelihood of impersonation by
using multifactor authentication:
a) Verifying the phone’s caller id,
b) Asking a one-time password from the user,
− Reducing the risk if devices are stolen by having
the one-time password being generated by
“something the user knows,” rather than
“something the user carries.”
An important feature of the proposed solution is
that it enables users to manage the tradeoff between
security assurances and the associated usability
overhead. Users with stringent requirements may use
more sophisticated mechanisms, such as generating
complex one-time passwords, while users more
concerned with ease of access can reduce the
overhead by using simpler flavours or skipping such
mechanisms.
Future work includes studies to evaluate how
end-users perceive the usability and usefulness of
the proposed security features.
REFERENCES
Di Pietro, R., Me, G., Strangio, M. A. (2005). "A two-
factor mobile authentication scheme for secure
financial transactions." International Conference on
Mobile Business: 28-34.
Enrico, R., Wetzstein, S., Schmidt, A. (2005). A
Framework for Mobile Interactions with the Physical
World. Wireless Personal Multimedia Communication
Conference (WPMC'05). Aalborg, Denmark.
Flesner, A. (2007). AutoIt v3: Your Quick Guide O'Reilly
Media
GoToMyPC. http://www.gotomypc.com.
Hamilton, A. (2007)." Banking Goes Mobile." TIME
Magazine, http://www.time.com/time/business/article/
0,8599,1605781,00.html.
Jammalamadaka, R. C. v. d. H., T.W. Mehrotra, S.
Seamons, K.E. Venkasubramanian, N. (2006).
"Delegate: A Proxy Based Architecture for Secure
Website Access from an Untrusted Machine."
Computer Security Applications Conference: 57-66.
Kageyama, Y. (2006). Cell Phone Takes Security to New
Heights. The Associated Press.
Kallender, P. (2005). Toshiba software will remotely
control PCs by cell phone. COMPUTERWORLD:
Today's top stories, http://www.computerworld.com/
softwaretopics/software/story/0,10801,99012,00.html.
Makoto Su, N., Sakane, Y., Tsukamoto, M., Nishio
Rajicon, S. (2002). Remote PC GUI operations via
constricted mobile interfaces. 8th annual international
conference on Mobile computing and networking,
Atlanta, Georgia, USA, ACM Press.
Oprea, A., Balfanz, D., Durfee, G., Smetters, D. (2004).
"Securing a remote terminal application with a mobile
trusted device." Computer Security Applications
Conference, 2004. 20th Annual: 438-447.
Roduner, C., Langheinrich, M., Floerkemeier, C.,
Schwarzentrub, B. (2007). Operating Appliances with
Mobile Phones - Strengths and Limits of a Universal
Interaction Device. Pervasive 2007, Intl Conference on
Pervasive Computing. Toronto, Ontario, Canada.
SoonR-Privacy-Officer. (2007). "Privacy Policy " from
http://www.soonr.com/web/front/security.jsp.
SoonR. "SoonR - In Touch Now, The Company."
Tiwari, R., Buse, S.,and Herstatt, C. (2007). Mobile
Services in Banking Sector: The Role of Innovative
Business Solutions in Generating Competitive
Advantage. Intl Research Conference on Quality,
Innovation and Knowledge Management, New Delhi.
Tsai, P., Lei, C., Wang W. (2004). A Remote Control
Scheme for Ubiquitous Personal Computing. IEEE
International Conference on Networking, Sensing &
Control, Taipei, Taiwan.
Van Meggelen, J., Smith, J., Madsen, L. (2005). Asterisk:
The Future of Telephony, O'Reilly Media, Inc.
IMPROVING THE SECURITY OF MOBILE-PHONE ACCESS TO REMOTE PERSONAL COMPUTERS
103