Digital signal processing (2nd ed.): principles, algorithms, and applications
Digital signal processing (2nd ed.): principles, algorithms, and applications
Security: for ubiquitous computing
Security: for ubiquitous computing
Artificial Neural Networks: Theory and Applications
Artificial Neural Networks: Theory and Applications
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Analyzing features for activity recognition
Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
A Compact, Wireless, Wearable Sensor Network for Interactive Dance Ensembles
BSN '06 Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Proceedings of the ACM SIGCOMM 2011 conference
Context-based security: state of the art, open research topics and a case study
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Entropy of audio fingerprints for unobtrusive device authentication
CONTEXT'11 Proceedings of the 7th international and interdisciplinary conference on Modeling and using context
Usability classification for spontaneous device association
Personal and Ubiquitous Computing
An amulet for trustworthy wearable mHealth
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Authenticated secret key extraction using channel characteristics for body area networks
Proceedings of the 2012 ACM conference on Computer and communications security
SAPHE: simple accelerometer based wireless pairing with heuristic trees
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Secure interaction with piggybacked key-exchange
Pervasive and Mobile Computing
Hi-index | 0.00 |
Hard restrictions in computing power and energy consumption favour symmetric key methods to encrypt the communication in wireless body area networks which in term impose questions on effective and user-friendly unobtrusive ways for key distribution. In this paper, we present a novel approach to establish a secure connection between two devices by shaking them together. Instead of distributing or exchanging a key, the devices independently generate a key from the measured acceleration data by appropriate signal processing methods. Exhaustive practical experiments based on acceleration data gathered from real hardware prototypes have shown that in about 80% of the cases, a common key can be successfully generated. The average entropy of these generated keys exceed 13bits.