Skip to main content
Log in

VariSecure: Facial Appearance Variance based Secure Device Pairing

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Ad hoc connection/pairing among IoT devices will be pervasive in the Next Generation Networking (NGN). However, due to its de-centralized nature, it faces more security challenges. In this paper, we propose a secure key pairing protocol for NGN, VariSecure, to enable confidential communication for smartphones. The idea is to leverage a natural human interaction mode: face-to-face interaction. Two users raise up their smartphones to establish a secure channel based on their similar observations from the view of the smartphones’ cameras. One user acts as the initiator and uses the front-facing camera to snap his/her face. The other user captures the initiator’s face using his/her rear camera. Utilizing the facial appearance as a secret substitution, the initiator delivers a randomly generated key to the other user, thus establishing a confidential communication channel between their devices. VariSecure achieves secure device pairing without the complex operations needed in prior works. We implemented VariSecure on the commercial off-the-shelf (COTS) smart devices. The experimental results show that VariSecure can establish a face-to-face secure pairing in less than 3 seconds.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Opencv library http://www.opencv.org

  2. Bergamasco F, Cosmo L, Schiavinato M, Albarelli A, Torsello A (2017) Dense multi-view homography estimation and plane segmentation. In: International Conference on Pattern Recognition, pp 3739–3744

  3. Cai L, Zeng K, Chen H, Mohapatra P (2011) Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas. In: Network and distributed system security symposium, NDSS 2011, San Diego, California, U.S

  4. Cootes TF, Taylor CJ, Cooper DH, Graham J (1995) Active shape models-their training and application. Comput Vis Image Underst 61(1):38–59

    Article  Google Scholar 

  5. Farb M, Lin YH, Kim HJ, Mccune J, Perrig A (2013) Safeslinger:easy-to-use and secure public-key exchange. In: ACM International Conference on Mobile Computing and Networking (ACM mobicom), pp 417–428

  6. Fomichev M, Álvarez F, Steinmetzer D, Gardner-Stephen P, Hollick M (2017) Survey and systematization of secure device pairing. IEEE Commun Surv Tutorials 20(1):517–550

    Article  Google Scholar 

  7. Jain AK, Farrokhnia F (1991) Unsupervised texture segmentation using gabor filters. Pattern Recogn 24 (12):1167–1186

    Article  Google Scholar 

  8. Jiang Z, Han J, Xi W, Zhao J (2015) Nfv: near field vibration based group device pairing. In: International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp 129–140

  9. Kalal Z, Mikolajczyk K, Matas J (2012) Tracking-learning-detection. IEEE Trans Pattern Anal Mach Intell 34(7):1409– 22

    Article  Google Scholar 

  10. Kazemi V, Sullivan J (2014) One millisecond face alignment with an ensemble of regression trees. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 1867–1874

  11. Le V, Brandt J, Lin Z, Bourdev L, Huang TS (2012) Interactive facial feature localization. In: European Conference on Computer Vision, pp 679–692

  12. Li L, Zhao X, Xue G (2013) Near field authentication for smart devices. In: IEEE INFOCOM, pp 375–379

  13. Liu W, Wen Y, Yu Z, Li M, Raj B, Song L (2017) Sphereface: Deep hypersphere embedding for face recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 6738–6746

  14. Luan T, Yin X, Liu X (2017) Disentangled representation learning gan for pose-invariant face recognition. In: Computer Vision and Pattern Recognition, pp 1283–1292

  15. Ma S, Bai L (2017) A face detection algorithm based on adaboost and new haar-like feature. In: IEEE International Conference on Software Engineering and Service Science, pp 651–654

  16. Matthews I, Baker S (2004) Active appearance models revisited. Int J Comput Vis 60(2):135–164

    Article  Google Scholar 

  17. Milborrow S, Nicolls F (2008) Locating facial features with an extended active shape model. In: European Conference on Computer Vision, pp 504–513

  18. Nandakumar R, Chintalapudi KK, Padmanabhan V, Venkatesan R (2013) Dhwani: secure peer-to-peer acoustic nfc. In: ACM SIGCOMM, pp 63–74

  19. Patwari N, Croft J, Jana S, Kasera SK (2010) High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE TMC

  20. Peng C, Shen G, Zhang Y, Lu S (2009) Point & connect: intention-based device pairing for mobile phone users. In: ACM MobiSys

  21. Sauer P, Cootes T, Taylor C (2011) Accurate regression procedures for active appearance models. Bmvc 1(6):681– 685

    Google Scholar 

  22. Schumann D, Sigg S (2013) Secure communication based on ambient audio. IEEE Trans Mob Comput 12 (2):358–370

    Article  Google Scholar 

  23. Seshadri K, Savvides M (2009) Robust modified active shape model for automatic facial landmark annotation of frontal faces. In: IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp 1–8

  24. Sethi M, Antikainen M, Aura T (2014) Commitment-based device pairing with synchronized drawing. In: IEEE International Conference on Pervasive Computing and Communications, pp 181–189

  25. Shenglong Yu HZ (2018) Rough sets and laplacian score based cost-sensitive feature selection. Plos One 13(6):1–23

  26. Stewart GW, Sun JG (1990) Matrix perturbation theory. Academic Press

  27. Sun Z, Purohit A, Bose R, Zhang P (2013) Spartacus:spatially-aware interaction for mobile devices through energy-efficient audio sensing. In: Proceeding of the International Conference on Mobile Systems, Applications, and Services, pp 263–276

  28. Xi W, Li XY, Qian C, Han J, Tang S, Zhao J, Zhao K (2014) Keep: Fast secret key extraction protocol for d2d communication. IEEE International Symposium of Quality of Service (IWQOS),pp 350–359

  29. Xi W, Qian C, Han J, Zhao K, Zhong S, Li XY, Zhao J (2016) Instant and robust authentication and key agreement among mobile devices. In: ACM Sigsac Conference on Computer and Communications Security, pp 616–627

  30. Xiao L, Wan X, Han Z (2017) Phy-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun PP(99):1–1

    Google Scholar 

  31. Xie Y, Li Z, Li M (2015) Precise power delay profiling with commodity wifi. In: International Conference on Mobile Computing and NETWORKING, pp 53–64

  32. Zhang K, Zhang L, Yang MH (2014) Fast compressive tracking. IEEE Trans Pattern Anal Mach Intell 36(10):2002– 2015

    Article  Google Scholar 

  33. Zhang L, Li XY, Huang W, Liu K, Zong S, Jian X, Feng P, Jung T, Liu Y (2014) It starts with igaze: Visual attention driven networking with smart glasses. In: ACM MobiCom

  34. Zhang R, Xiao Y, Sun S, Ma H (2017) Efficient multi-factor authenticated key exchange scheme for mobile communications. IEEE Trans Dependable Secure Comput PP(99):1–1

    Google Scholar 

  35. Zhao M, Qian HM, Rong YJ, Chen G (2017) Robust object tracking via sparse representation based on compressive collaborative haar-like feature space. In: International Conference on Audio, Language and Image Processing

Download references

Acknowledgements

This work is supported by the following funds, including Natural Science Foundation of China (NSFC) #61802291, #61502374, National Postdoctoral Program for Innovative Talent under Grant #BX20180235, Shaanxi Fund #2018JM6125, #B018230008, #BD34017020001, Open Fund of State Key Laboratory of Computer Architecture #CARCH201704, the Youth Innovation Team of Shaanxi Universities, and the Fundamental Research Funds for the Central Universities under Grant #JB171003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Li.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jiang, Z., Qian, C., Zhao, K. et al. VariSecure: Facial Appearance Variance based Secure Device Pairing. Mobile Netw Appl 26, 870–883 (2021). https://doi.org/10.1007/s11036-019-01330-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01330-7

Keywords

Navigation