Games for extracting randomness
Proceedings of the 5th Symposium on Usable Privacy and Security
GesturePIN: using discrete gestures for associating mobile devices
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
PhoneTouch: a technique for direct phone interaction on surfaces
UIST '10 Proceedings of the 23nd annual ACM symposium on User interface software and technology
Protractor3D: a closed-form solution to rotation-invariant 3D gestures
Proceedings of the 16th international conference on Intelligent user interfaces
How users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Proceedings of the ACM SIGCOMM 2011 conference
Recognizing whether sensors are on the same body
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Entropy of audio fingerprints for unobtrusive device authentication
CONTEXT'11 Proceedings of the 7th international and interdisciplinary conference on Modeling and using context
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
Proceedings of the 27th Annual Computer Security Applications Conference
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
Multichannel protocols to prevent relay attacks
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
Body area network security: robust key establishment using human body channel
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Recognizing whether sensors are on the same body
Pervasive and Mobile Computing
SAPHE: simple accelerometer based wireless pairing with heuristic trees
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Combining social authentication and untrusted clouds for private location sharing
Proceedings of the 18th ACM symposium on Access control models and technologies
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
RFID shakables: pairing radio-frequency identification tags with the help of gesture recognition
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Hi-index | 0.00 |
A challenge in facilitating spontaneous mobile interactions is to provide pairing methods that are both intuitive and secure. Simultaneous shaking is proposed as a novel and easy-to-use mechanism for pairing of small mobile devices. The underlying principle is to use common movement as a secret that the involved devices share for mutual authentication. We present two concrete methods, ShaVe and ShaCK, in which sensing and analysis of shaking movement is combined with cryptographic protocols for secure authentication. ShaVe is based on initial key exchange followed by exchange and comparison of sensor data for verification of key authenticity. ShaCK, in contrast, is based on matching features extracted from the sensor data to construct a cryptographic key. The classification algorithms used in our approach are shown to robustly separate simultaneous shaking of two devices from other concurrent movement of a pair of devices, with a false negative rate of under 12 percent. A user study confirms that the method is intuitive and easy to use, as users can shake devices in an arbitrary pattern.