Abstract
Wrist-worn smart devices are being used to share various sensitive personal information in various fields such as social, medical, sports, etc. Secure pairing establishing a trusted channel between the involved devices is a prerequisite to ensure data transmission security. Handshake has been proposed to realize secure pairing between devices worn by different users without pre-shared knowledge, the participation of third parties and complex user interactions. However, existing schemes cannot meet the practical requirement in terms of time delay and security. In this paper, we proposed a feasible handshake based secure pairing scheme, which utilizes the handshake acceleration data. Specifically, we quantify the features of acceleration data through random threshold values, to shorten the handshake time required for guaranteeing the length of the negotiated key. Besides, we propose an optimal feature selection algorithm that improves the success rate and security of the system. What’s more, security analysis indicates that our solution can resist man-in-the-middle attacks. Experiments are performed on our scheme, which show that the proposed scheme is robust and secure. Users only need to take a few seconds to perform simple operations, and the devices can automatically pair securely.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fomichev, M., Álvarez, F., Steinmetzer, D., Gardner-Stephen, P., Hollick, M.: Survey and systematization of secure device pairing. IEEE Commun. Surv. Tutorial 20, 517–550 (2018)
Zhang, N., Wu, R., Yuan, S., Yuan, C., Chen, D.: RAV: relay aided vectorized secure transmission in physical layer security for internet of things under active attacks. IEEE Internet Things J. 8496–8506 (2019)
Mirzadeh, S., Cruickshank, H., Tafazolli, R.: Secure device pairing: A survey. IEEE Commun. Surv. Tutorials 16, 17–40 (2014)
Zhang, N., Cheng, N., Lu, N., Zhang, X., Mark, J., Shen, X.: Partner selection and incentive mechanism for physical layer security. IEEE Trans. Wireless Commun. 8, 4265–4276 (2015)
Chen, D., Zhang, N., Cheng, N.: Physical layer based message authentication with secure channel codes. IEEE Trans, Dependable Secure Comput (2018)
Jiang, Q., Zhang, N., Ni, J., Ma, J., Ma, X.: Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans. Veh, Technol (2020)
Schürmann, D., Brüsch, A., Sigg, S., Wolf, L.: BANDANA – body area network device-to-device authentication using natural gait (2017)
Groza, B., Mayrhofer, R.: SAPHE - simple accelerometer based wireless pairing with heuristic trees. In: Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia (2012)
Sun, Y., Wong, C., Yang, G.Z., Lo, B.: Secure key generation using gait features for body sensor networks (2017)
Mayrhofer, R., Gellersen, H.: Shake well before use: Intuitive and secure pairing of mobile devices. IEEE T. Mob. Comput. 8, 792–806 (2009)
Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., Beigl, M., Gellersen, H.-W.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 116–122. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45427-6_10
Xu, W., Revadigar, G., Luo, C., Bergmann, N., Hu, W.: Walkie-Talkie: motion-assisted automatic key generation for secure on-body device communication. In: 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), p. 12 (2016)
Liu, H., Wang, Y., Yang, J., Chen, Y.: Fast and practical secret key extraction by exploiting channel response (2013)
Liu, H., Yang, J., Wang, Y., Chen, Y., Koksal, C.E.: Group secret key generation via received signal strength: Protocols, achievable rates, and implementation. IEEE T. Mob. Comput. 13, 2820–2835 (2014)
Schürmann, D., Sigg, S.: Secure communication based on ambient audio. IEEE T. Mob. Comput. 12, 358–370 (2013)
Yue, Q., Srinivasan, K., Arora, A.: Shape matters, not the size: a new approach to extract secrets from channel. In: ACM Workshop on Hot Topics in Wireless (2014)
Guo, Z., Gao, X., Ma, Q.: Secure device pairing via handshake detection. Tsinghua Science and Technology (2018)
Shen, Y., Yang, F., Du, B., Xu, W., Wen, H.: Shake-n-Shack: enabling secure data exchange between smart wearables via handshakes. In: IEEE International Conference on Pervasive Computing and Communications (2018)
Jiang, Q., Huang, X., Zhang, N., Zhang, K., Ma, X., Ma, J.: Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices. IEEE Internet Things 6, 5618–5630 (2019)
Zhang, N., Lu, N., Cheng, N., Mark, J., Shen, X.: Cooperative spectrum access towards secure information transfer for CRNs. IEEE J. Sel. Areas Commun. 2013, 2453–2464 (2013)
Zhang, N.,et al.: Physical layer authentication for internet of things via WFRFT-based Gaussian tag embedding. IEEE Internet Things J. (2020)
Christian, G., Kaisa, N.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29–37 (2004)
Chong, M.K., Mayrhofer, R., Gellersen, H.: A survey of user interaction for spontaneous device association. ACM Comput. Surv. 47, 1–40 (2014)
Chong, M.K., Gellersen, H.: Classification of spontaneous device association from a usability perspective (2010)
Ming, K.C., Gellersen, H.: Usability classification for spontaneous device association. Pers. Ubiquitous Comput. 16, 77–89 (2012)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme (1999)
Jiang, Q., Chen, Z., Ma, J., Ma, X., Shen, J., Wu, D.: Optimized fuzzy commitment based key agreement protocol for wireless body area network. IEEE Trans. Emerg. Topics Comput. (2019)
Bose, R.C., Raychaudhuri, D.K.: On a class of error correcting binary group codes (1960)
Acknowledgement
This work is supported by the National Natural Science Foundation of China (61672413, U1708262, 61872449, 61772548, 61902290, 61772008), the project “The Verification Platform of Multi-tier Coverage Communication Network for oceans (LZC0020)”, Scientific Research Program Funded by the Education Department of Shaanxi Province (Program No. 20JY016), the Fundamental Research Funds for the Central Universities, the Innovation Fund of Xidian University, Natural Science Foundation of Shaanxi Province (2019JM-109), Key Research and Development Program of Shaanxi (2019ZDLGY12–04, 2020ZDLGY09–06), China Postdoctoral Science Foundation (2018M640962).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Huang, X., Zhao, G., Jiang, Q., Ma, X., Tian, Y., Ma, J. (2021). Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users. In: Gao, H., Wang, X., Iqbal, M., Yin, Y., Yin, J., Gu, N. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 349. Springer, Cham. https://doi.org/10.1007/978-3-030-67537-0_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-67537-0_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67536-3
Online ISBN: 978-3-030-67537-0
eBook Packages: Computer ScienceComputer Science (R0)