skip to main content
10.1145/2428955.2428989acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

SAPHE: simple accelerometer based wireless pairing with heuristic trees

Published: 03 December 2012 Publication History

Abstract

Accelerometers provide a good source of entropy for bootstrapping a secure communication channel in autonomous and spontaneous interactions between mobile devices that share a common context but were not previously associated. We propose two simple and efficient key exchange protocols based on accelerometer data that use only simple hash functions combined with heuristic search trees. Using heuristics such as the Euclidean distance proves to be beneficial as it allows a more effective recovery of the shared key. While the first protocol seems to give just some performance improvements, the second, which we call hashed heuristic tree, is more secure than previous proposals since it increases the difference in protocol execution between benign and malicious parties. Nevertheless, the hashed heuristic tree is an entirely new approach which has the advantage of allowing different heuristics in the search, leaving plenty of room for future variants and optimizations.

References

[1]
K. Altun, B. Barshan, and O. Tunçel. Comparative study on classifying human activities with miniature inertial and magnetic sensors. Pattern Recognition, 43(10):3605--3620, 2010.
[2]
S. Bamberg, A. Benbasat, D. Scarborough, D. Krebs, and J. Paradiso. Gait analysis using a shoe-integrated wireless sensor system. IEEE Transactions on Information Technology in Biomedicine, 12(4):413--423, 2008.
[3]
D. Bichler, G. Stromberg, M. Huemer, and M. Löw. Key generation based on acceleration data of shaking processes. In Proceedings of the 9th International Conference on Ubiquitous Computing, pages 304--317. Springer-Verlag, 2007.
[4]
G. Caridakis, K. Karpouzis, A. Drosopoulos, and S. Kollias. Somm: Self organizing markov map for gesture recognition. Pattern Recognition Letters, 31(1):52--59, 2010.
[5]
C. Castelluccia and P. Mutaf. Shake them up!: a movement-based pairing protocol for cpu-constrained devices. In Proceedings of the 3rd international conference on Mobile systems, applications, and services, pages 51--64. ACM, 2005.
[6]
J. Cheng, C. Xie, W. Bian, and D. Tao. Feature fusion for 3d hand gesture recognition by learning a shared hidden space. Pattern Recognition Letters, 33(4):476--484, 2012.
[7]
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 523--540. Springer Berlin / Heidelberg, 2004.
[8]
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: A brief survey of results from 2004 to 2006. Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, pages 79--99, 2007.
[9]
D. Figo, P. Diniz, D. Ferreira, and J. Cardoso. Preprocessing techniques for context recognition from accelerometer data. Personal and Ubiquitous Computing, 14(7):645--662, 2010.
[10]
D. Gafurov and E. Snekkenes. Gait recognition using wearable motion recording sensors. EURASIP Journal on Advances in Signal Processing, 2009:7, 2009.
[11]
D. Gafurov, E. Snekkenes, and P. Bours. Spoof attacks on gait authentication system. IEEE Transactions on Information Forensics and Security, 2(3):491--502, sept. 2007.
[12]
O. Goldreich and Y. Lindell. Session-key generation using human passwords only. Journal of Cryptology, 19(3):241--340, 2006
[13]
K. Haataja and P. Toivanen. Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. Wireless Communications, IEEE Transactions on, 9(1):384--392, january 2010.
[14]
L. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Proc. UbiComp 2001, pages 116--122. Springer-Verlag, September 2001.
[15]
H. Junker, O. Amft, P. Lukowicz, and G. Tröster. Gesture spotting with body-worn inertial sensors to detect user activities. Pattern Recognition, 41(6):2010--2024, 2008.
[16]
D. Kirovski, M. Sinclair, and D. Wilson. The martini synch: joint fuzzy hashing via error correction. Security and Privacy in Ad-hoc and Sensor Networks, pages 16--30, 2007.
[17]
A. Kumar, N. Saxena, G. Tsudik, and E. Uzun. A comparative study of secure device pairing methods. Pervasive and Mobile Computing, 5(6):734--749, 2009.
[18]
J. Lester, B. Hannaford, and G. Borriello. "Are You with Me?" --using accelerometers to determine if two devices are carried by the same person. Pervasive Computing, pages 33--50, 2004.
[19]
J. Liu, Z. Wang, L. Zhong, J. Wickramasuriya, and V. Vasudevan. uWave: Accelerometer-based personalized gesture recognition and its applications. In Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on, pages 1--9, march 2009.
[20]
R. Mayrhofer. The candidate key protocol for generating secret shared keys from similar sensor data streams. Security and Privacy in Ad-hoc and Sensor Networks, pages 1--15, 2007.
[21]
R. Mayrhofer, J. Fuss, and I. Ion. UACAP: A unified auxiliary channel authentication protocol. IEEE Transactions on Mobile Computing, 2012. accepted for publication in 2012.
[22]
R. Mayrhofer and H. Gellersen. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing, 8(6):792--806, 2009.
[23]
P. Siirtola, H. Koskimäki, V. Huikari, P. Laurinen, and J. Röning. Improving the classification accuracy of streaming data using sax similarity features. Pattern Recognition Letters, 2011.
[24]
J. Yang, J. Wang, and Y. Chen. Using acceleration measurements for activity recognition: An effective learning algorithm for constructing neural classifiers. Pattern recognition letters, 29(16):2213--2220, 2008.

Cited By

View all
  • (2023)Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory SensorsProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627185(424-438)Online publication date: 4-Dec-2023
  • (2023)Fingerprinting Smartphone Accelerometers with Traditional Classifiers and Deep Learning Networks2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)10.1109/SACI58269.2023.10158600(000039-000044)Online publication date: 23-May-2023
  • (2023)A Survey of Wearable Devices Pairing Based on Biometric SignalsIEEE Access10.1109/ACCESS.2023.325449911(26070-26085)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. SAPHE: simple accelerometer based wireless pairing with heuristic trees

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      MoMM '12: Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
      December 2012
      323 pages
      ISBN:9781450313070
      DOI:10.1145/2428955
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • @WAS: International Organization of Information Integration and Web-based Applications and Services

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 December 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. accelerometer
      2. authentication
      3. key-exchange

      Qualifiers

      • Research-article

      Conference

      MoMM '12
      Sponsor:
      • @WAS

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory SensorsProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627185(424-438)Online publication date: 4-Dec-2023
      • (2023)Fingerprinting Smartphone Accelerometers with Traditional Classifiers and Deep Learning Networks2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)10.1109/SACI58269.2023.10158600(000039-000044)Online publication date: 23-May-2023
      • (2023)A Survey of Wearable Devices Pairing Based on Biometric SignalsIEEE Access10.1109/ACCESS.2023.325449911(26070-26085)Online publication date: 2023
      • (2022)Use It-No Need to Shake It!Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35503226:3(1-25)Online publication date: 7-Sep-2022
      • (2022)CardioID: Secure ECG-BCG Agnostic Interaction-Free Device PairingIEEE Access10.1109/ACCESS.2022.322650310(128682-128696)Online publication date: 2022
      • (2021)Secure Audio-Visual Data Exchange for Android In-Vehicle EcosystemsApplied Sciences10.3390/app1119927611:19(9276)Online publication date: 6-Oct-2021
      • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
      • (2021)BCG & ECG-based secure communication for medical devices in Body Area Networks2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops51409.2021.9430964(207-212)Online publication date: 22-Mar-2021
      • (2021)Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different UsersMobile Networks and Applications10.1007/s11036-021-01781-xOnline publication date: 27-May-2021
      • (2021)Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different UsersCollaborative Computing: Networking, Applications and Worksharing10.1007/978-3-030-67537-0_30(493-510)Online publication date: 22-Jan-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media