Skip to main content

Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration

  • Conference paper
  • First Online:
Web, Artificial Intelligence and Network Applications (WAINA 2019)

Abstract

Currently, IoT devices often use wireless technologies to communicate with each other. An example is ad-hoc device pairing such as wireless distribution of meeting materials from a PC to mobile device. The problem in this case is spoofing by an impersonator. In order to solve this problem, we proposed secure device pairing method using similarity between displacement data of a marker displayed on devices and acceleration data obtained from devices. We performed experiments to confirm similarity and whether impersonator can pair with the server. As a result, we found that similarity was low and unstable. Therefore, in this paper, we propose an extended method that marker changes at an interval. These sequence of markers displayed on the device is used to recognize the device by a camera in addition to calculation of the similarity. We performed 3 experiments to confirm the similarity displacement data and examined whether an eavesdropper outside the camera range can perform pairing. Also, we performed pairing of some device together. As a result, average similarity was higher than that of previous method and pairing of three devices succeeded at rate of about 70%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Varshavsky, A., Scannell, A., LaMarca, A., de Lara, E.: Amigo: proximity-based authentication of mobile devices. In: Proceedings of the 9th International Conference on Ubiquitous Computing (UbiComp 2007), pp. 253–270 (2007)

    Google Scholar 

  2. Agata, Y., Hong, J., Ohtsuki, T.: Room-level proximity detection based on RSS of dual-band Wi-Fi signals. In: Proceedings of 2016 IEEE International Conference on Communications (ICC) (2016)

    Google Scholar 

  3. Saxena, N., Ekberg, J.E., Kostianien, K.: Secure device pairing based on a visual channel: design and usability study. IEEE Trans. Inf. Forensics Secur. 6(1), 28–38 (2010)

    Article  Google Scholar 

  4. Rofouei, M., Wilson, A.D., Brush, A.J.B., Tansley, S.: Your phone or mine? Fusing body, touch and device sensing for multi-user device-display interaction. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 149–158 (2012). Camera View, Intelligent Robots and Systems, pp. 3872–3877 (2008)

    Google Scholar 

  5. Wilson, A.D., Benko, H.: CrossMotion: fusing device and image motion for user identification, tracking and device association. In: Proceedings of the 16th International Conference on Multimodal Interaction, pp. 216–223 (2014)

    Google Scholar 

  6. Maruhashi, N., Terada, T., Tsukamoto, M.: A method for identification of moving objects integrative use of a camera and accelerometers. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1–6 (2012)

    Google Scholar 

  7. Osamu, S., Kagami, S., Hashimoto, K.: Identifying a moving object with an accelerometer in a camera view. In: Proceedings of the 16th International Conference on Multimodal Interaction, pp. 216–223 (2014)

    Google Scholar 

  8. Nagatomo, M., Aburada, K., Okazaki, N., Park, M.: Proposal and evaluation of secure device pairing method with camera and accelerometer. In: Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW), pp. 310–315 (2018)

    Google Scholar 

  9. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  10. Aruco. https://docs.opencv.org/3.2.0/d5/dae/tutorial_aruco_detection.html. Accessed 28 Jan 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mirang Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nagatomo, M., Aburada, K., Yamaba, H., Okazaki, N., Park, M. (2019). Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol 927. Springer, Cham. https://doi.org/10.1007/978-3-030-15035-8_66

Download citation

Publish with us

Policies and ethics