MultiBoosting: A Technique for Combining Boosting and Wagging
Machine Learning
Communications of the ACM
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Secure Device Pairing based on a Visual Channel (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Loud and Clear: Human-Verifiable Authentication Based on Audio
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Mobile Phones Will Become The Primary Personal Computing Devices
WMCSA '06 Proceedings of the Seventh IEEE Workshop on Mobile Computing Systems & Applications
Enabling Secure and Spontaneous Communication between Mobile Devices using Common Radio Environment
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
LoKey: leveraging the SMS network in decentralized, end-to-end trust establishment
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Instant matchmaking: simple and secure integrated ubiquitous computing environments
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Theorizing mobility in community networks
International Journal of Human-Computer Studies
Proceedings of the 15th ACM conference on Computer and communications security
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
Point&Connect: intention-based device pairing for mobile phone users
Proceedings of the 7th international conference on Mobile systems, applications, and services
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A framework for secure device pairing by demonstration of physical proximity
Proceedings of the 8th International Conference on Frontiers of Information Technology
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
Data-minimizing authentication goes mobile
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Runtime adaptive multi-factor authentication for mobile devices
IBM Journal of Research and Development
Hi-index | 0.00 |
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices using knowledge of their shared radio environment as proof of physical proximity. We present evaluation results that show that our technique is robust against a range of passive and active attacks. The key advantages of our technique are that it does not require any additional hardware to be present on the devices beyond the radios that are already used for communication, it does not require user involvement to verify the validity of the authentication process, and it is not vulnerable to eavesdropping.