Skip to main content
Article thumbnail
Location of Repository

Shake well before use: Authentication based on Accelerometer Data

By Rene Mayrhofer and Hans Gellersen

Abstract

Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. We introduce a new method for device-to-device authentication by shaking devices together. This paper describes two protocols for combining cryptographic authentication techniques with known methods of accelerometer data analysis to the effect of generating authenticated, secret keys. The protocols differ in their design, one being more conservative from a security point of view, while the other allows more dynamic interactions. Three experiments are used to optimize and validate our proposed authentication method

Publisher: Springer-Verlag,
Year: 2007
OAI identifier: oai:eprints.lancs.ac.uk:12925
Provided by: Lancaster E-Prints

Suggested articles

Citations

  1. (2005). Analyzing features for activity recognition. In: doi
  2. (2004). Are you with me?” – Using accelerometers to determine if two devices are carried by the same person. In: doi
  3. (2004). Automatic calibration of body worn acceleration sensors. In: doi
  4. (2005). Finding collisions in the full SHA-1. In: doi
  5. (2001). H.W.: Smartits friends: A technique for users to easily establish connections between smart artefacts. In: doi
  6. (1984). How to expose an eavesdropper. doi
  7. (2006). J.A.: A compact, wireless, wearable sensor network for interactive dance ensembles. In: doi
  8. (2006). J.P.: Key agreement in peer-to-peer wireless networks. doi
  9. (2006). Leveraging the sms network in decentralized, end-to-end trust establishment. In: doi
  10. (2006). Loud and clear: Human verifiable authentication based on audio. In: doi
  11. (2005). M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: doi
  12. (2004). Manual authentication for wireless devices.
  13. (1976). New directions in cryptography. doi
  14. (2005). S.H.: Evidently secure device associations.
  15. (2005). Secure communications over insecure channels based on short authenticated strings. In: doi
  16. (2005). Shake them up! In: doi
  17. (2005). Side-channel issues for designing secure hardware implementations. In: doi
  18. (2003). Synchronous gestures for multiple persons and computers. In: doi
  19. (2004). The emphemeral pairing problem. In: doi
  20. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In: doi
  21. (2003). Validating and securing spontaneous associations between wireless devices. In: doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.