Shake Well Before Use: Authentication Based on Accelerometer Data

作者: Rene Mayrhofer , Hans Gellersen

DOI: 10.1007/978-3-540-72037-9_9

关键词:

摘要: Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating communication, which is problematic when do not have any a priori information about each other. We introduce new method for device-to-device authentication shaking together. This paper describes two protocols combining cryptographic techniques with known methods of accelerometer data analysis the effect generating authenticated, secret keys. The differ in their design, one being more conservative from security point view, while other allows dynamic interactions. Three experiments are used optimize and validate our proposed method.

参考文章(26)
Tim Kindberg, Kan Zhang, Validating and Securing Spontaneous Associations between Wireless Devices international conference on information security. pp. 44- 53 ,(2003) , 10.1007/10958513_4
Anthony J. Nicholson, Ian E. Smith, Jeff Hughes, Brian D. Noble, LoKey: Leveraging the SMS Network in Decentralized, End-to-End Trust Establishment Lecture Notes in Computer Science. pp. 202- 219 ,(2006) , 10.1007/11748625_13
Serge Vaudenay, Secure communications over insecure channels based on short authenticated strings international cryptology conference. ,vol. 3621, pp. 309- 326 ,(2005) , 10.1007/11535218_19
Jonathan Lester, Blake Hannaford, Gaetano Borriello, “Are You with Me?” – Using Accelerometers to Determine If Two Devices Are Carried by the Same Person Lecture Notes in Computer Science. pp. 33- 50 ,(2004) , 10.1007/978-3-540-24646-6_3
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, Finding collisions in the full SHA-1 international cryptology conference. pp. 17- 36 ,(2005) , 10.1007/11535218_2
Paul Lukowicz, Holger Junker, Gerhard Tröster, Automatic Calibration of Body Worn Acceleration Sensors Lecture Notes in Computer Science. pp. 176- 181 ,(2004) , 10.1007/978-3-540-24646-6_11
Jaap-Henk Hoepman, The Ephemeral Pairing Problem financial cryptography. pp. 212- 226 ,(2004) , 10.1007/978-3-540-27809-2_22
Tâm Huynh, Bernt Schiele, Analyzing features for activity recognition ambient intelligence. pp. 159- 163 ,(2005) , 10.1145/1107548.1107591
Ken Hinckley, Synchronous gestures for multiple persons and computers user interface software and technology. pp. 149- 158 ,(2003) , 10.1145/964696.964713
Claude Castelluccia, Pars Mutaf, Shake them up! Proceedings of the 3rd international conference on Mobile systems, applications, and services - MobiSys '05. pp. 51- 64 ,(2005) , 10.1145/1067170.1067177