skip to main content
10.1145/1555816.1555831acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Point&Connect: intention-based device pairing for mobile phone users

Published:22 June 2009Publication History

ABSTRACT

Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-andconnect: when a user plans to pair her mobile phone with another device nearby, she makes a simple hand gesture that points her phone towards the intended target. The system will capture the user's gesture, understand the target selection intention, and complete the device pairing. P&C is intention-based, intuitive, and reduces user efforts in device pairing. The main technical challenge is to come up with a simple system technique to effectively capture and understand the intention of the user, and pick the right device among many others nearby. It should further work on any mobile phones or small devices without relying on infrastructure or special hardware. P&C meets this challenge with a novel collaborative scheme to measure maximum distance change based on acoustic signals. Using only a speaker and a microphone, P&C can be implemented solely in user-level software and work on COTS phones. P&C adds additional mechanisms to improve resiliency against imperfect user actions, acoustic disturbance, and even certain malicious attacks. We have implemented P&C in Windows Mobile phones and conducted extensive experimental evaluation, and showed that it is a cool and effective way to perform device pairing.

References

  1. ]]Bluetooth simple pairing. http://www.bluetooth.com/NR/rdonlyres/0A0B3F36-D15F-4470-85A6-F2CCFA26F%70F/0/SimplePairing_WP_V10r00.pdf.Google ScholarGoogle Scholar
  2. ]]QR code. http://www.nttdocomo.co.jp/english/service/imode/make/content/barcode/t%ool/.Google ScholarGoogle Scholar
  3. ]]Semacode. http://semacode.com/.Google ScholarGoogle Scholar
  4. ]]WiFi Protected Setup. http://www.wi-fi.org/wifi-protected-setup.Google ScholarGoogle Scholar
  5. ]]Windows Connect Now Technology. http://www.microsoft.com/windowsxp/using/networking/getstarted/windowsconnectnow.mspx.Google ScholarGoogle Scholar
  6. ]]Wireless USB Association Models. http://www.usb.org/developers/wusb/.Google ScholarGoogle Scholar
  7. ]]A. Adya, P. Bahl, R. Chandra, and L. Qiu. Architecture and techniques for diagnosing faults in ieee 802.11 infrastructure networks. In MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking, pages 30--44, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ]]D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS '02), San Diego, CA, February 2002.Google ScholarGoogle Scholar
  9. ]]B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris. Persistent personal names for globally connected mobile devices. In OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation, pages 233--248, Berkeley, CA, USA, 2006. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. ]]M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human-verifiable authentication based on audio. In ICDCS '06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, page 10, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. ]]K. Hinckley. Synchronous gestures for multiple persons and computers. In UIST '03: Proceedings of the 16th annual ACM symposium on User interface software and technology, pages 149--158, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. ]]L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In UbiComp '01: Proceedings of the 3rd international conference on Ubiquitous Computing, pages 116--122, London, UK, 2001. Springer--Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. ]]D. Kirovski, M. Sinclair, and D. Wilson. The martini synch: Device pairing via joint quantization. In ISIT '07: Proceedings of IEEE International Symposium on Information Theory, 2007, July 2007.Google ScholarGoogle ScholarCross RefCross Ref
  14. ]]B. Kusy, A. Ledeczi, and X. Koutsoukos. Tracking mobile nodes using rf doppler shifts. In SenSys '07: Proc. of the 5th Intl. conference on Embedded networked sensor systems, pages 29--42, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. ]]C. V. Lopes and P. M. Q. Aguiar. Aerial Acoustic Communications. In Proceedings of the 2001 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, New Paltz, NY, 2001.Google ScholarGoogle Scholar
  16. ]]R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based on accelerometer data. In A. LaMarca, M. Langheinrich, and K. N. Truong, editors, Pervasive, volume 4480 of Lecture Notes in Computer Science, pages 144--161. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. ]]R. Mayrhofer, H. Gellersen, and M. Hazas. Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction. In Ubicomp, pages 199--216, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. ]]J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 110--124, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. ]]K. Nickel and R. Stiefelhagen. Visual recognition of pointing gestures for human-robot interaction. Image Vision Comput., 25(12):1875--1884, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. ]]C. Peng, G. Shen, Y. Zhang, Y. Li, and K. Tan. Beepbeep: a high accuracy acoustic ranging system using cots mobile devices. In SenSys '07: Proceedings of the 5th international conference on Embedded networked sensor systems, pages 1--14, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. ]]R. Prasad and N. Saxena. Efficient device pairing using "human-comparable"synchronized audiovisual patterns. In S. M. Bellovin, R. Gennaro, A. D. Keromytis, and M. Yung, editors, ACNS, volume 5037 of Lecture Notes in Computer Science, pages 328--345, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. ]]J. Rekimoto, Y. Ayatsuka, and M. Kohno. Synctap: An interaction technique for mobile networking. In Mobile HCI, pages 104--115, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  23. ]]E. Rukzio. Physical Mobile Interactions: Mobile Devices as Pervasive Mediators for Interactions with the Real World. PhD thesis, University of Munich, 2006.Google ScholarGoogle Scholar
  24. ]]E. Rukzio, K. Leichtenstern, V. Callaghan, A. Schmidt, P. Holleis, and J. Chin. An experimental comparison of physical mobile interaction techniques: Touching, pointing and scanning. In Ubicomp'06: Eighth International Conference on Ubiquitous Computing, September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. ]]N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan. Secure device pairing based on a visual channel. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pages 306--313, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. ]]N. Saxena, M. B. Uddin, and J. Voris. Universal device pairing using an auxiliary device. In SOUPS '08: Proceedings of the 4th symposium on Usable privacy and security, pages 56--67, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. ]]G. Schmidt, Y. Baillot, D. G. Brown, E. B. Tomlin, and J. E. I. Swan. Toward disambiguating multiple selections for frustum-based pointing. In 3DUI '06: Proceedings of the 3D User Interfaces, pages 87--94, Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. ]]C. Soriente, G. Tsudik, and E. Uzun. Hapadep: Human-assisted pure audio device pairing. In ISC, pages 385--400, 2008. http://eprint.iacr.org/2007/093.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. ]]E. Uzun, K. Karvonen, and N. Asokan. Usability analysis of secure pairing methods. http://research.nokia.com/files/NRC-TR-2007-002.pdf, 2007.Google ScholarGoogle Scholar
  30. ]]A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara. Amigo: Proximity-based authentication of mobile devices. In Ubicomp, pages 253--270, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. ]]K. Yatani, K. Tamura, K. Hiroki, M. Sugimoto, and H. Hashizume. Toss-it: intuitive information transfer techniques for mobile devices. In CHI Extended Abstracts, pages 1881--1884, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Point&Connect: intention-based device pairing for mobile phone users

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              MobiSys '09: Proceedings of the 7th international conference on Mobile systems, applications, and services
              June 2009
              370 pages
              ISBN:9781605585666
              DOI:10.1145/1555816

              Copyright © 2009 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 22 June 2009

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate274of1,679submissions,16%

              Upcoming Conference

              MOBISYS '24

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader