Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-72037-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Shake Well Before Use: Authentication Based on Accelerometer Data

Abstract: Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. We introduce a new method for device-to-device authentication by shaking devices together. This paper describes two protocols for combining cryptographic authentication techniques with known methods of a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
138
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 182 publications
(142 citation statements)
references
References 21 publications
0
138
0
Order By: Relevance
“…Many researchers have focused on providing device connections using collocated human movements or continuous actions. These interfaces include pressing buttons simultaneously on both devices [8] , pressing buttons sequentially [9] , bumping devices together [10][11][12] , shaking devices together [13][14] , and stroking the device [15] . The spatial proximity of the two devices is sensed via infrared or radio frequency identification (RFID) technology [8] .…”
Section: Related Work On Device Connectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many researchers have focused on providing device connections using collocated human movements or continuous actions. These interfaces include pressing buttons simultaneously on both devices [8] , pressing buttons sequentially [9] , bumping devices together [10][11][12] , shaking devices together [13][14] , and stroking the device [15] . The spatial proximity of the two devices is sensed via infrared or radio frequency identification (RFID) technology [8] .…”
Section: Related Work On Device Connectionmentioning
confidence: 99%
“…Firstly, much existing work has assumed that associated devices have primitive connections to other devices or services [8][9][14][15] . It follows that help is not available to the user when they have a problem with the primitive connection.…”
Section: Related Work On Device Connectionmentioning
confidence: 99%
“…Up to recently, few reports in this area exist. Mayrhover et al [14] proposed a system whereby two mobile devices are held and shaken together to create a shared secret key. In this case, both devices must have embedded accelerometers, and the acceleration data are converted into the same key.…”
Section: Out-of-band Channelsmentioning
confidence: 99%
“…Imposing movement on associating devices by shaking them together or simultaneous button presses in order to create shared secret data was discussed in [8] and [15].…”
Section: Examples Of Manual Authentication Protocolsmentioning
confidence: 99%