Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Session-Key Generation Using Human Passwords Only
Journal of Cryptology
Gesture spotting with body-worn inertial sensors to detect user activities
Pattern Recognition
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
IEEE Transactions on Mobile Computing
uWave: Accelerometer-based personalized gesture recognition and its applications
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
SOMM: Self organizing Markov map for gesture recognition
Pattern Recognition Letters
Gait recognition using wearable motion recording sensors
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
A comparative study of secure device pairing methods
Pervasive and Mobile Computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
The Martini Synch: joint fuzzy hashing via error correction
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures
IEEE Transactions on Wireless Communications
Preprocessing techniques for context recognition from accelerometer data
Personal and Ubiquitous Computing
Improving the classification accuracy of streaming data using SAX similarity features
Pattern Recognition Letters
Feature fusion for 3D hand gesture recognition by learning a shared hidden space
Pattern Recognition Letters
Spoof Attacks on Gait Authentication System
IEEE Transactions on Information Forensics and Security - Part 2
Gait Analysis Using a Shoe-Integrated Wireless Sensor System
IEEE Transactions on Information Technology in Biomedicine
UACAP: A Unified Auxiliary Channel Authentication Protocol
IEEE Transactions on Mobile Computing
Lightweight secure communication protocols for in-vehicle sensor networks
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Hi-index | 0.00 |
Accelerometers provide a good source of entropy for bootstrapping a secure communication channel in autonomous and spontaneous interactions between mobile devices that share a common context but were not previously associated. We propose two simple and efficient key exchange protocols based on accelerometer data that use only simple hash functions combined with heuristic search trees. Using heuristics such as the Euclidean distance proves to be beneficial as it allows a more effective recovery of the shared key. While the first protocol seems to give just some performance improvements, the second, which we call hashed heuristic tree, is more secure than previous proposals since it increases the difference in protocol execution between benign and malicious parties. Nevertheless, the hashed heuristic tree is an entirely new approach which has the advantage of allowing different heuristics in the search, leaving plenty of room for future variants and optimizations.