Abstract
Ad hoc connection/pairing among IoT devices will be pervasive in the Next Generation Networking (NGN). However, due to its de-centralized nature, it faces more security challenges. In this paper, we propose a secure key pairing protocol for NGN, VariSecure, to enable confidential communication for smartphones. The idea is to leverage a natural human interaction mode: face-to-face interaction. Two users raise up their smartphones to establish a secure channel based on their similar observations from the view of the smartphones’ cameras. One user acts as the initiator and uses the front-facing camera to snap his/her face. The other user captures the initiator’s face using his/her rear camera. Utilizing the facial appearance as a secret substitution, the initiator delivers a randomly generated key to the other user, thus establishing a confidential communication channel between their devices. VariSecure achieves secure device pairing without the complex operations needed in prior works. We implemented VariSecure on the commercial off-the-shelf (COTS) smart devices. The experimental results show that VariSecure can establish a face-to-face secure pairing in less than 3 seconds.
Similar content being viewed by others
References
Opencv library http://www.opencv.org
Bergamasco F, Cosmo L, Schiavinato M, Albarelli A, Torsello A (2017) Dense multi-view homography estimation and plane segmentation. In: International Conference on Pattern Recognition, pp 3739–3744
Cai L, Zeng K, Chen H, Mohapatra P (2011) Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas. In: Network and distributed system security symposium, NDSS 2011, San Diego, California, U.S
Cootes TF, Taylor CJ, Cooper DH, Graham J (1995) Active shape models-their training and application. Comput Vis Image Underst 61(1):38–59
Farb M, Lin YH, Kim HJ, Mccune J, Perrig A (2013) Safeslinger:easy-to-use and secure public-key exchange. In: ACM International Conference on Mobile Computing and Networking (ACM mobicom), pp 417–428
Fomichev M, Álvarez F, Steinmetzer D, Gardner-Stephen P, Hollick M (2017) Survey and systematization of secure device pairing. IEEE Commun Surv Tutorials 20(1):517–550
Jain AK, Farrokhnia F (1991) Unsupervised texture segmentation using gabor filters. Pattern Recogn 24 (12):1167–1186
Jiang Z, Han J, Xi W, Zhao J (2015) Nfv: near field vibration based group device pairing. In: International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp 129–140
Kalal Z, Mikolajczyk K, Matas J (2012) Tracking-learning-detection. IEEE Trans Pattern Anal Mach Intell 34(7):1409– 22
Kazemi V, Sullivan J (2014) One millisecond face alignment with an ensemble of regression trees. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 1867–1874
Le V, Brandt J, Lin Z, Bourdev L, Huang TS (2012) Interactive facial feature localization. In: European Conference on Computer Vision, pp 679–692
Li L, Zhao X, Xue G (2013) Near field authentication for smart devices. In: IEEE INFOCOM, pp 375–379
Liu W, Wen Y, Yu Z, Li M, Raj B, Song L (2017) Sphereface: Deep hypersphere embedding for face recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp 6738–6746
Luan T, Yin X, Liu X (2017) Disentangled representation learning gan for pose-invariant face recognition. In: Computer Vision and Pattern Recognition, pp 1283–1292
Ma S, Bai L (2017) A face detection algorithm based on adaboost and new haar-like feature. In: IEEE International Conference on Software Engineering and Service Science, pp 651–654
Matthews I, Baker S (2004) Active appearance models revisited. Int J Comput Vis 60(2):135–164
Milborrow S, Nicolls F (2008) Locating facial features with an extended active shape model. In: European Conference on Computer Vision, pp 504–513
Nandakumar R, Chintalapudi KK, Padmanabhan V, Venkatesan R (2013) Dhwani: secure peer-to-peer acoustic nfc. In: ACM SIGCOMM, pp 63–74
Patwari N, Croft J, Jana S, Kasera SK (2010) High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE TMC
Peng C, Shen G, Zhang Y, Lu S (2009) Point & connect: intention-based device pairing for mobile phone users. In: ACM MobiSys
Sauer P, Cootes T, Taylor C (2011) Accurate regression procedures for active appearance models. Bmvc 1(6):681– 685
Schumann D, Sigg S (2013) Secure communication based on ambient audio. IEEE Trans Mob Comput 12 (2):358–370
Seshadri K, Savvides M (2009) Robust modified active shape model for automatic facial landmark annotation of frontal faces. In: IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp 1–8
Sethi M, Antikainen M, Aura T (2014) Commitment-based device pairing with synchronized drawing. In: IEEE International Conference on Pervasive Computing and Communications, pp 181–189
Shenglong Yu HZ (2018) Rough sets and laplacian score based cost-sensitive feature selection. Plos One 13(6):1–23
Stewart GW, Sun JG (1990) Matrix perturbation theory. Academic Press
Sun Z, Purohit A, Bose R, Zhang P (2013) Spartacus:spatially-aware interaction for mobile devices through energy-efficient audio sensing. In: Proceeding of the International Conference on Mobile Systems, Applications, and Services, pp 263–276
Xi W, Li XY, Qian C, Han J, Tang S, Zhao J, Zhao K (2014) Keep: Fast secret key extraction protocol for d2d communication. IEEE International Symposium of Quality of Service (IWQOS),pp 350–359
Xi W, Qian C, Han J, Zhao K, Zhong S, Li XY, Zhao J (2016) Instant and robust authentication and key agreement among mobile devices. In: ACM Sigsac Conference on Computer and Communications Security, pp 616–627
Xiao L, Wan X, Han Z (2017) Phy-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun PP(99):1–1
Xie Y, Li Z, Li M (2015) Precise power delay profiling with commodity wifi. In: International Conference on Mobile Computing and NETWORKING, pp 53–64
Zhang K, Zhang L, Yang MH (2014) Fast compressive tracking. IEEE Trans Pattern Anal Mach Intell 36(10):2002– 2015
Zhang L, Li XY, Huang W, Liu K, Zong S, Jian X, Feng P, Jung T, Liu Y (2014) It starts with igaze: Visual attention driven networking with smart glasses. In: ACM MobiCom
Zhang R, Xiao Y, Sun S, Ma H (2017) Efficient multi-factor authenticated key exchange scheme for mobile communications. IEEE Trans Dependable Secure Comput PP(99):1–1
Zhao M, Qian HM, Rong YJ, Chen G (2017) Robust object tracking via sparse representation based on compressive collaborative haar-like feature space. In: International Conference on Audio, Language and Image Processing
Acknowledgements
This work is supported by the following funds, including Natural Science Foundation of China (NSFC) #61802291, #61502374, National Postdoctoral Program for Innovative Talent under Grant #BX20180235, Shaanxi Fund #2018JM6125, #B018230008, #BD34017020001, Open Fund of State Key Laboratory of Computer Architecture #CARCH201704, the Youth Innovation Team of Shaanxi Universities, and the Fundamental Research Funds for the Central Universities under Grant #JB171003.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Jiang, Z., Qian, C., Zhao, K. et al. VariSecure: Facial Appearance Variance based Secure Device Pairing. Mobile Netw Appl 26, 870–883 (2021). https://doi.org/10.1007/s11036-019-01330-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01330-7