ABSTRACT
Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-andconnect: when a user plans to pair her mobile phone with another device nearby, she makes a simple hand gesture that points her phone towards the intended target. The system will capture the user's gesture, understand the target selection intention, and complete the device pairing. P&C is intention-based, intuitive, and reduces user efforts in device pairing. The main technical challenge is to come up with a simple system technique to effectively capture and understand the intention of the user, and pick the right device among many others nearby. It should further work on any mobile phones or small devices without relying on infrastructure or special hardware. P&C meets this challenge with a novel collaborative scheme to measure maximum distance change based on acoustic signals. Using only a speaker and a microphone, P&C can be implemented solely in user-level software and work on COTS phones. P&C adds additional mechanisms to improve resiliency against imperfect user actions, acoustic disturbance, and even certain malicious attacks. We have implemented P&C in Windows Mobile phones and conducted extensive experimental evaluation, and showed that it is a cool and effective way to perform device pairing.
- ]]Bluetooth simple pairing. http://www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F%70F/0/SimplePairing_WP_V10r00.pdf.Google Scholar
- ]]QR code. http://www.nttdocomo.co.jp/english/service/imode/make/content/barcode/t%ool/.Google Scholar
- ]]Semacode. http://semacode.com/.Google Scholar
- ]]WiFi Protected Setup. http://www.wi-fi.org/wifi-protected-setup.Google Scholar
- ]]Windows Connect Now Technology. http://www.microsoft.com/windowsxp/using/networking/getstarted/windowsconnectnow.mspx.Google Scholar
- ]]Wireless USB Association Models. http://www.usb.org/developers/wusb/.Google Scholar
- ]]A. Adya, P. Bahl, R. Chandra, and L. Qiu. Architecture and techniques for diagnosing faults in ieee 802.11 infrastructure networks. In MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking, pages 30--44, New York, NY, USA, 2004. ACM. Google ScholarDigital Library
- ]]D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS '02), San Diego, CA, February 2002.Google Scholar
- ]]B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris. Persistent personal names for globally connected mobile devices. In OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation, pages 233--248, Berkeley, CA, USA, 2006. USENIX Association. Google ScholarDigital Library
- ]]M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human-verifiable authentication based on audio. In ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, page 10, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarDigital Library
- ]]K. Hinckley. Synchronous gestures for multiple persons and computers. In UIST '03: Proceedings of the 16th annual ACM symposium on User interface software and technology, pages 149--158, New York, NY, USA, 2003. ACM. Google ScholarDigital Library
- ]]L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In UbiComp '01: Proceedings of the 3rd international conference on Ubiquitous Computing, pages 116--122, London, UK, 2001. Springer--Verlag. Google ScholarDigital Library
- ]]D. Kirovski, M. Sinclair, and D. Wilson. The martini synch: Device pairing via joint quantization. In ISIT '07: Proceedings of IEEE International Symposium on Information Theory, 2007, July 2007.Google ScholarCross Ref
- ]]B. Kusy, A. Ledeczi, and X. Koutsoukos. Tracking mobile nodes using rf doppler shifts. In SenSys '07: Proc. of the 5th Intl. conference on Embedded networked sensor systems, pages 29--42, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
- ]]C. V. Lopes and P. M. Q. Aguiar. Aerial Acoustic Communications. In Proceedings of the 2001 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, New Paltz, NY, 2001.Google Scholar
- ]]R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based on accelerometer data. In A. LaMarca, M. Langheinrich, and K. N. Truong, editors, Pervasive, volume 4480 of Lecture Notes in Computer Science, pages 144--161. Springer, 2007. Google ScholarDigital Library
- ]]R. Mayrhofer, H. Gellersen, and M. Hazas. Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction. In Ubicomp, pages 199--216, 2007. Google ScholarDigital Library
- ]]J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 110--124, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarDigital Library
- ]]K. Nickel and R. Stiefelhagen. Visual recognition of pointing gestures for human-robot interaction. Image Vision Comput., 25(12):1875--1884, 2007. Google ScholarDigital Library
- ]]C. Peng, G. Shen, Y. Zhang, Y. Li, and K. Tan. Beepbeep: a high accuracy acoustic ranging system using cots mobile devices. In SenSys '07: Proceedings of the 5th international conference on Embedded networked sensor systems, pages 1--14, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
- ]]R. Prasad and N. Saxena. Efficient device pairing using "human-comparable"synchronized audiovisual patterns. In S. M. Bellovin, R. Gennaro, A. D. Keromytis, and M. Yung, editors, ACNS, volume 5037 of Lecture Notes in Computer Science, pages 328--345, 2008. Google ScholarDigital Library
- ]]J. Rekimoto, Y. Ayatsuka, and M. Kohno. Synctap: An interaction technique for mobile networking. In Mobile HCI, pages 104--115, 2003.Google ScholarCross Ref
- ]]E. Rukzio. Physical Mobile Interactions: Mobile Devices as Pervasive Mediators for Interactions with the Real World. PhD thesis, University of Munich, 2006.Google Scholar
- ]]E. Rukzio, K. Leichtenstern, V. Callaghan, A. Schmidt, P. Holleis, and J. Chin. An experimental comparison of physical mobile interaction techniques: Touching, pointing and scanning. In Ubicomp'06: Eighth International Conference on Ubiquitous Computing, September 2006. Google ScholarDigital Library
- ]]N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan. Secure device pairing based on a visual channel. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 306--313, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarDigital Library
- ]]N. Saxena, M. B. Uddin, and J. Voris. Universal device pairing using an auxiliary device. In SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security, pages 56--67, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- ]]G. Schmidt, Y. Baillot, D. G. Brown, E. B. Tomlin, and J. E. I. Swan. Toward disambiguating multiple selections for frustum-based pointing. In 3DUI '06: Proceedings of the 3D User Interfaces, pages 87--94, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarDigital Library
- ]]C. Soriente, G. Tsudik, and E. Uzun. Hapadep: Human-assisted pure audio device pairing. In ISC, pages 385--400, 2008. http://eprint.iacr.org/2007/093.pdf. Google ScholarDigital Library
- ]]E. Uzun, K. Karvonen, and N. Asokan. Usability analysis of secure pairing methods. http://research.nokia.com/files/NRC-TR-2007-002.pdf, 2007.Google Scholar
- ]]A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara. Amigo: Proximity-based authentication of mobile devices. In Ubicomp, pages 253--270, 2007. Google ScholarDigital Library
- ]]K. Yatani, K. Tamura, K. Hiroki, M. Sugimoto, and H. Hashizume. Toss-it: intuitive information transfer techniques for mobile devices. In CHI Extended Abstracts, pages 1881--1884, 2005. Google ScholarDigital Library
Index Terms
- Point&Connect: intention-based device pairing for mobile phone users
Recommendations
Spartacus: spatially-aware interaction for mobile devices through energy-efficient audio sensing
MobiSys '13: Proceeding of the 11th annual international conference on Mobile systems, applications, and servicesRecent developments in ubiquitous computing enable applications that leverage personal mobile devices, such as smartphones, as a means to interact with other devices in their close proximity. In this paper, we propose Spartacus, a mobile system that ...
Seeing-Is-Believing: using camera phones for human-verifiable authentication
Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. We present and analyse Seeing-Is-Believing (SiB), a system that utilises ...
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices
Current mobile technology gives us ubiquitous services with personal mobile devices such as smart phones, tablet PCs, and laptops. With these mobile devices, the human users may wish to exchange sensitive data with others (e.g., their friends or their ...
Comments