Skip to main content

Applications of QR Codes in Secure Mobile Data Exchange

  • Conference paper
Computer Networks (CN 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 431))

Included in the following conference series:

Abstract

In the paper new method of secure data transmission between mobile devices is proposed. Already existing applications demand on the user to care about secure issues himself or herself. Derived method focuses on secure channel creation using well known QR codes technology, which allows prevent the eavesdropper from interception transmitted data during connection establishing process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhang, Y., Hong, J., Cranor, L.: Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, pp. 639–648. ACM (2007)

    Google Scholar 

  2. Vidas, T., Votipka, D., Christin, N.: All your droid are belong to us: A survey of current android attacks. In: Proceedings of the 5th USENIX WOOT, p. 10. USENIX Association (2011)

    Google Scholar 

  3. Vidas, T., Owusu, E., Wang, S., Zeng, C., Cranor, L.F., Christin, N.: QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 52–69. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Tamir, C.: AVG (AU/NZ) Cautions: Beware of Malicious QR Codes. PCWorld (June 2011)

    Google Scholar 

  5. Nikiforakis, N., Meert, W., Younan, Y., Johns, M., Joosen, W.: Sessionshield: lightweight protection against session hijacking. In: Erlingsson, Ú., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 87–100. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Adid, B.: Sessionlock: securing web sessions against eavesdropping. In: Proceedings of the 17th International Conference on World Wide Web, pp. 517–524 (2008)

    Google Scholar 

  7. Lin, H.: The study and implementation of the wireless network data security model. In: Fifth International Conference on Machine Vision (ICMV 12). International Society for Optics and Photonics (2013)

    Google Scholar 

  8. Al-Haiqi, A., Jumari, K., Ismail, M.: Insider Threats+Disruptive Smart Phone Technology = New Challenges to Corporate Security. Research Journal of Applied Sciences 8(3), 161–166 (2013)

    Google Scholar 

  9. Ryan, M.: Bluetooth: with low energy comes low security. Presented as part of the 7th USENIX Workshop on Offensive Technologies, USENIX (2013)

    Google Scholar 

  10. Ahuja, M.S.: A Review of Security Weaknesses in Bluetooth. International Journal of Computers & Distributed Systems 1(3), 50–53 (2012)

    MathSciNet  Google Scholar 

  11. Haataja, K., Hyppönen, K., Pasanen, S., Toivanen, P.: Reasons for Bluetooth Network Vulnerabilities. In: Bluetooth Security Attacks, Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  12. Sriram, V., Sahoo, G.: A Mobile Agent Based Architecture for Securing WLANs. International Journal of Recent Trends in Engineering (2009)

    Google Scholar 

  13. Huang, J.: A study of the security technology and a new security model for WiFi network. In: Fifth International Conference on Digital Image Processing. International Society for Optics and Photonics (2013)

    Google Scholar 

  14. BS ISO/IEC 18004:2006. Information technology. Automatic identification and data capture techniques. QR Code 2005 bar code symbology specification

    Google Scholar 

  15. http://www.qrcode.com/en/codes/

  16. Khang, S., Hong, T., Chin, T., Wang, S.: Wireless Mobile-Based Shopping Mall Car Parking System (WMCPS). In: IEEE Asia-Pacific Services Computing Conferences (APSCC), pp. 573–577 (2010)

    Google Scholar 

  17. Lee, Y.S., Kim, N.H., Lim, H., Jo, H.K., Lee, H.J.: Online banking authentication system using mobile-OTP with QR-code. In: 2010 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 644–648 (2011)

    Google Scholar 

  18. Al-Khalifa, H.S.: Utilizing QR code and mobile phones for blinds and visually impaired people. In: Miesenberger, K., Klaus, J., Zagler, W.L., Karshmer, A.I. (eds.) ICCHP 2008. LNCS, vol. 5105, pp. 1065–1069. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Hłobaż, A.: Security of measurement data transmission – message encryption method with concurrent hash counting. Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne 80(1), 13–15 (2007) (in Polish)

    Google Scholar 

  20. Hłobaż, A.: Security of measurement data transmission – modifications of the message encryption method along with concurrent hash counting. Przegląd Włókienniczy – Włókno, Odzież, 39–42 (2008) (in Polish)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hłobaż, A., Podlaski, K., Milczarski, P. (2014). Applications of QR Codes in Secure Mobile Data Exchange. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2014. Communications in Computer and Information Science, vol 431. Springer, Cham. https://doi.org/10.1007/978-3-319-07941-7_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07941-7_28

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07940-0

  • Online ISBN: 978-3-319-07941-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics