Skip to main content

Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users

  • Conference paper
  • First Online:

Abstract

Wrist-worn smart devices are being used to share various sensitive personal information in various fields such as social, medical, sports, etc. Secure pairing establishing a trusted channel between the involved devices is a prerequisite to ensure data transmission security. Handshake has been proposed to realize secure pairing between devices worn by different users without pre-shared knowledge, the participation of third parties and complex user interactions. However, existing schemes cannot meet the practical requirement in terms of time delay and security. In this paper, we proposed a feasible handshake based secure pairing scheme, which utilizes the handshake acceleration data. Specifically, we quantify the features of acceleration data through random threshold values, to shorten the handshake time required for guaranteeing the length of the negotiated key. Besides, we propose an optimal feature selection algorithm that improves the success rate and security of the system. What’s more, security analysis indicates that our solution can resist man-in-the-middle attacks. Experiments are performed on our scheme, which show that the proposed scheme is robust and secure. Users only need to take a few seconds to perform simple operations, and the devices can automatically pair securely.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fomichev, M., Álvarez, F., Steinmetzer, D., Gardner-Stephen, P., Hollick, M.: Survey and systematization of secure device pairing. IEEE Commun. Surv. Tutorial 20, 517–550 (2018)

    Article  Google Scholar 

  2. Zhang, N., Wu, R., Yuan, S., Yuan, C., Chen, D.: RAV: relay aided vectorized secure transmission in physical layer security for internet of things under active attacks. IEEE Internet Things J. 8496–8506 (2019)

    Google Scholar 

  3. Mirzadeh, S., Cruickshank, H., Tafazolli, R.: Secure device pairing: A survey. IEEE Commun. Surv. Tutorials 16, 17–40 (2014)

    Article  Google Scholar 

  4. Zhang, N., Cheng, N., Lu, N., Zhang, X., Mark, J., Shen, X.: Partner selection and incentive mechanism for physical layer security. IEEE Trans. Wireless Commun. 8, 4265–4276 (2015)

    Article  Google Scholar 

  5. Chen, D., Zhang, N., Cheng, N.: Physical layer based message authentication with secure channel codes. IEEE Trans, Dependable Secure Comput (2018)

    Google Scholar 

  6. Jiang, Q., Zhang, N., Ni, J., Ma, J., Ma, X.: Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans. Veh, Technol (2020)

    Book  Google Scholar 

  7. Schürmann, D., Brüsch, A., Sigg, S., Wolf, L.: BANDANA – body area network device-to-device authentication using natural gait (2017)

    Google Scholar 

  8. Groza, B., Mayrhofer, R.: SAPHE - simple accelerometer based wireless pairing with heuristic trees. In: Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia (2012)

    Google Scholar 

  9. Sun, Y., Wong, C., Yang, G.Z., Lo, B.: Secure key generation using gait features for body sensor networks (2017)

    Google Scholar 

  10. Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. IEEE T. Mob. Comput. 8, 792–806 (2009)

    Article  Google Scholar 

  11. Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 116–122. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45427-6_10

    Chapter  Google Scholar 

  12. Xu, W., Revadigar, G., Luo, C., Bergmann, N., Hu, W.: Walkie-Talkie: motion-assisted automatic key generation for secure on-body device communication. In: 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), p. 12 (2016)

    Google Scholar 

  13. Liu, H., Wang, Y., Yang, J., Chen, Y.: Fast and practical secret key extraction by exploiting channel response (2013)

    Google Scholar 

  14. Liu, H., Yang, J., Wang, Y., Chen, Y., Koksal, C.E.: Group secret key generation via received signal strength: Protocols, achievable rates, and implementation. IEEE T. Mob. Comput. 13, 2820–2835 (2014)

    Article  Google Scholar 

  15. Schürmann, D., Sigg, S.: Secure communication based on ambient audio. IEEE T. Mob. Comput. 12, 358–370 (2013)

    Article  Google Scholar 

  16. Yue, Q., Srinivasan, K., Arora, A.: Shape matters, not the size: a new approach to extract secrets from channel. In: ACM Workshop on Hot Topics in Wireless (2014)

    Google Scholar 

  17. Guo, Z., Gao, X., Ma, Q.: Secure device pairing via handshake detection. Tsinghua Science and Technology (2018)

    Google Scholar 

  18. Shen, Y., Yang, F., Du, B., Xu, W., Wen, H.: Shake-n-Shack: enabling secure data exchange between smart wearables via handshakes. In: IEEE International Conference on Pervasive Computing and Communications (2018)

    Google Scholar 

  19. Jiang, Q., Huang, X., Zhang, N., Zhang, K., Ma, X., Ma, J.: Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices. IEEE Internet Things 6, 5618–5630 (2019)

    Article  Google Scholar 

  20. Zhang, N., Lu, N., Cheng, N., Mark, J., Shen, X.: Cooperative spectrum access towards secure information transfer for CRNs. IEEE J. Sel. Areas Commun. 2013, 2453–2464 (2013)

    Article  Google Scholar 

  21. Zhang, N.,et al.: Physical layer authentication for internet of things via WFRFT-based Gaussian tag embedding. IEEE Internet Things J. (2020)

    Google Scholar 

  22. Christian, G., Kaisa, N.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29–37 (2004)

    Google Scholar 

  23. Chong, M.K., Mayrhofer, R., Gellersen, H.: A survey of user interaction for spontaneous device association. ACM Comput. Surv. 47, 1–40 (2014)

    Article  Google Scholar 

  24. Chong, M.K., Gellersen, H.: Classification of spontaneous device association from a usability perspective (2010)

    Google Scholar 

  25. Ming, K.C., Gellersen, H.: Usability classification for spontaneous device association. Pers. Ubiquitous Comput. 16, 77–89 (2012)

    Article  Google Scholar 

  26. Juels, A., Wattenberg, M.: A fuzzy commitment scheme (1999)

    Google Scholar 

  27. Jiang, Q., Chen, Z., Ma, J., Ma, X., Shen, J., Wu, D.: Optimized fuzzy commitment based key agreement protocol for wireless body area network. IEEE Trans. Emerg. Topics Comput. (2019)

    Book  Google Scholar 

  28. Bose, R.C., Raychaudhuri, D.K.: On a class of error correcting binary group codes (1960)

    Google Scholar 

Download references

Acknowledgement

This work is supported by the National Natural Science Foundation of China (61672413, U1708262, 61872449, 61772548, 61902290, 61772008), the project “The Verification Platform of Multi-tier Coverage Communication Network for oceans (LZC0020)”, Scientific Research Program Funded by the Education Department of Shaanxi Province (Program No. 20JY016), the Fundamental Research Funds for the Central Universities, the Innovation Fund of Xidian University, Natural Science Foundation of Shaanxi Province (2019JM-109), Key Research and Development Program of Shaanxi (2019ZDLGY12–04, 2020ZDLGY09–06), China Postdoctoral Science Foundation (2018M640962).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qi Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, X., Zhao, G., Jiang, Q., Ma, X., Tian, Y., Ma, J. (2021). Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users. In: Gao, H., Wang, X., Iqbal, M., Yin, Y., Yin, J., Gu, N. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 349. Springer, Cham. https://doi.org/10.1007/978-3-030-67537-0_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67537-0_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67536-3

  • Online ISBN: 978-3-030-67537-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics