Communications of the ACM
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Practical Cryptography
Synchronous gestures for multiple persons and computers
Proceedings of the 16th annual ACM symposium on User interface software and technology
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Side-Channel Issues for Designing Secure Hardware Implementations
IOLTS '05 Proceedings of the 11th IEEE International On-Line Testing Symposium
Analyzing features for activity recognition
Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
A Compact, Wireless, Wearable Sensor Network for Interactive Dance Ensembles
BSN '06 Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
Loud and Clear: Human-Verifiable Authentication Based on Audio
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Human-in-the-loop: rethinking security in mobile and pervasive systems
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Challenges and architectural approaches for authenticating mobile users
Proceedings of the 1st international workshop on Software architectures and mobility
HAPADEP: Human-Assisted Pure Audio Device Pairing
ISC '08 Proceedings of the 11th international conference on Information Security
Proceedings of the 15th ACM conference on Computer and communications security
A mobile device management framework for secure service delivery
Information Security Tech. Report
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Secure pairing of interface constrained devices
International Journal of Security and Networks
Secure pairing with biometrics
International Journal of Security and Networks
Using audio in secure device pairing
International Journal of Security and Networks
Point&Connect: intention-based device pairing for mobile phone users
Proceedings of the 7th international conference on Mobile systems, applications, and services
Serial hook-ups: a comparative usability study of secure device pairing methods
Proceedings of the 5th Symposium on Usable Privacy and Security
User evaluation of lightweight user authentication with a single tri-axis accelerometer
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
Exploring the Use of Discrete Gestures for Authentication
INTERACT '09 Proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction: Part II
A taxonomy for and analysis of multi-person-display ecosystems
Personal and Ubiquitous Computing
A comparative study of secure device pairing methods
Pervasive and Mobile Computing
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Tandem: a context-aware method for spontaneous clustering of dynamic wireless sensor nodes
IOT'08 Proceedings of the 1st international conference on The internet of things
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Two heads are better than one: security and usability of device associations in group scenarios
Proceedings of the Sixth Symposium on Usable Privacy and Security
Groupthink: usability of secure group association for wireless devices
Proceedings of the 12th ACM international conference on Ubiquitous computing
A framework for secure device pairing by demonstration of physical proximity
Proceedings of the 8th International Conference on Frontiers of Information Technology
Pairing devices for social interactions: a comparative usability evaluation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Secure in-band wireless pairing
SEC'11 Proceedings of the 20th USENIX conference on Security
Context-based security: state of the art, open research topics and a case study
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Entropy of audio fingerprints for unobtrusive device authentication
CONTEXT'11 Proceedings of the 7th international and interdisciplinary conference on Modeling and using context
Secure negotiation for manual authentication protocols
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Monitoring children's developmental progress using augmented toys and activity recognition
Personal and Ubiquitous Computing
Secure and usable out-of-band channels for ad hoc mobile device interactions
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
An automatic, time-based, secure pairing protocol for passive RFID
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
On the practicality of motion based keystroke inference attack
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
A study on automatic recognition of object use exploiting motion correlation of wireless sensors
Personal and Ubiquitous Computing
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Data-minimizing authentication goes mobile
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Memory stones: an intuitive copy-and-paste method between multi-touch computers
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
SWINGNAGE: gesture-based mobile interactions on distant public displays
Proceedings of the 2013 ACM international conference on Interactive tabletops and surfaces
Using tap sequences to authenticate drivers
Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications
Secure interaction with piggybacked key-exchange
Pervasive and Mobile Computing
Hi-index | 0.00 |
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. We introduce a new method for device-to-device authentication by shaking devices together. This paper describes two protocols for combining cryptographic authentication techniques with known methods of accelerometer data analysis to the effect of generating authenticated, secret keys. The protocols differ in their design, one being more conservative from a security point of view, while the other allows more dynamic interactions. Three experiments are used to optimize and validate our proposed authentication method.