Skip to main content
Log in

Using short-range communication to control mobile device functionality

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

This paper describes a prototype system, ZoneIT, for selectively controlling the functionality of mobile devices, e.g. the ringing of cellular telephones. ZoneIT exploits the fact that many such devices have short-range radio communication systems (e.g. Bluetooth and ZigBee). It uses such radio systems to allow these devices to communicate with Base Stations to learn what functionality is permissible in a particular zone. ZoneIT is secured by a process that enables mobile devices to authenticate base stations, and so protect against denial of service attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. This paper is a revised version of [1].

  2. The ZoneIT prototype does not protect from replay at a distance by including the Base Station’s address in messages.

References

  1. Moors T, Mei M, Salim A (2005) ZoneIT: using short-range radios to control mobile device functionality. In: Proceedings of the international conference on mobile business, July 2005, pp 485–491

  2. Haartsen J, Mattisson S (2000) Bluetooth—a new low-power radio interface providing short-range connectivity. Proc IEEE 88(10):1651–1661

    Article  Google Scholar 

  3. Leeper D (2003) Ultrawideband—the next step in short-range wireless. Proc IEEE MTT-S Int Microwave Symp 1:357–360

    Google Scholar 

  4. Consumer Electronics Association (2004) Status indicator for and control of transmitters in portable electronic devices (PEDs). Consumer Electronics Association Recommended Practice, October 2004

  5. Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MATH  MathSciNet  Google Scholar 

  6. Kaufman C, Perlman R, Speciner M (1995) Network security: private communication in a public world. Prentice Hall, New York

  7. Palo Wireless (1999) Time taken to complete inquiry/paging procedures, http://www.palowireless.com/infotooth/knowbase/baseband/99.asp

  8. (2003) Web page: Symbian DevZone—SwitchMe—solving the inappropriate ringing problem? http://www.wirelessdevnet.com/symbian/rb_50.html

  9. Mosses C, Midtgaard J, Enevoldsen M, Jørgensen K (2003) Pervasive Computing—group project, http://www.daimi.au.dk/∼ups/PvC/project-descriptions/group-10.html

  10. ‘SmartProfiles’, http://www.symbianware.com/product.php?id=sprofiles&lang=en&pl=all&s=0, 2002

  11. Sullivan B (2001) Jamming could be the answer to mobile phone traffic, ZDNet News, http://www.news.zdnet.com/2100–9595_22–528850.html

  12. Bansal R (2004) Knock on wood [cell-phone jamming device]. IEEE Microw Mag 5(1):38–40

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tim Moors.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Moors, T., Mei, M. & Salim, A. Using short-range communication to control mobile device functionality. Pers Ubiquit Comput 12, 11–18 (2008). https://doi.org/10.1007/s00779-006-0124-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-006-0124-1

Keywords

Navigation