Abstract
Device pairing is a significant problem for a large class of increasingly popular resource-constrained wireless protocols such as Bluetooth. The objective of pairing is to establish a secure wireless communication channel between two specific devices without a public-key infrastructure, a secure near-field communication channel, or electrical contact. We use a surprising user-device interaction as a solution to this problem. By adding an accelerometer, a device can sense its motion in a Cartesian space relative to the inertial space. The idea is to have two devices in a fixed, relative position to each other. Then, the joint object is moved randomly in 3D for several seconds. The unique motion generates approximately the same distinct signal at the accelerometers. The difference between the signals in the two inertially conjoined sensors should be relatively small under normal motion induced manually. The objective is to derive a deterministic key at both sides with maximized entropy that will be used as a private key for symmetric encryption. Currently, our prototype produces between 10–15 bits of entropy per second of usual manual motion using off-the-shelf components.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Haartsen, J., et al.: Bluetooth: Vision, goals, and architecture. Mobile Computing and Communications Review 2, 38–45 (1998)
IETF PKIX workgroup. Public-Key Infrastructure X.509
Hinckley, K.: Synchronous Gestures for Multiple Users and Computers. In: ACM UIST Symposium on User Interface Software & Technology, pp. 149–158 (2003)
Holmquist, L.E., et al.: Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001: Ubiquitous Computing. LNCS, vol. 2201, pp. 116–122. Springer, Heidelberg (2001)
Rivest, R.L., et al.: A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM 21(2), 120–126 (1978)
IETF TLS workgroup. Transport Layer Security
Naor, M., Nissim, K.: Certificate revocation and certificate update. USENIX Security Symposium (1998)
IEEE 1363-2000: Standard Specifications for Public Key Cryptography.
Analog Devices Corp. ADXL330. available on-line at, http://www.analog.com .
Massey, J., Khachatrian, G., Kuregian, M.: Nomination of SAFER+ as Candidate Algorithm for the Advanced Encryption Standard. NIST AES Proposal (1998)
Fluhrer, S., Lucks, S.: Analysis of the E0 Encryption System. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, Springer, Heidelberg (2001)
Lu, Y., Vaudenay, S.: Faster correlation attack on Bluetooth keystream generator E0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 407–425. Springer, Heidelberg (2004)
Armknecht, F.: A linearization attack on the Bluetooth key stream generator. Cryptology ePrint Archive, report 2002/191 (2002), available from http://eprint.iacr.org/2002/191
Laurie, A., Herfurt, M., Holtmann, M.: Hacking Bluetooth enabled mobile phones and beyond. In: 21st Chaos Communication Congress (2003)
Whitehouse, O.: War nibbling: Bluetooth insecurity. @Stake, research report (2003)
Wong, F.-L., Stajano, F.: Repairing the Bluetooth pairing protocol. In: Proceedings of Security Protocols Workshop (2005)
Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. International Conference on Mobile Systems, Applications, and Services, pp. 39–50 (2005)
Menezes, A.J., et al.: Handbook of applied cryptography. CRC Press, Boca Raton, FL (1997)
Lester, J., et al.: Are You with Me? – Using Accelerometers to Determine If Two Devices Are Carried by the Same Person. Pervasive Computing, pp. 33–50 (2004)
Patel, S.N., et al.: A gesture-based authentication scheme for untrusted public terminals. ACM User. Interface Software and Technology, pp. 157–160 (2004)
Castelluccia, C., Mutaf, P.: Shake Them Up!: a movement-based pairing protocol for CPU-constrained devices. MobiSys, 2005 (2005)
Monga, V., et al.: A Clustering Based Approach to Perceptual Image Hashing. IEEE Transactions on Information Forensics and Security 1(1), 68–79 (2006)
Johnson, M., Ramchandran, K.: Dither-Based Secure Image Hashing Using Distributed Coding. In: IEEE International Conference on Image Processing (2003)
Swaminathan, A., Mao, Y., Wu, M.: Robust and Secure Hashing for Images. IEEE Transactions on Information Forensics and Security (2006)
Kalker, T., Haitsma, J., Oostveen, J.: Robust audio hashing for content identification. In: International Workshop on Content Based Multimedia Indexing (2001)
Burges, C.J., et al.: Distortion discriminant analysis for audio fingerprinting. IEEE Transactions on Speech and Audio Processing 11(3), 165–174 (2003)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Wolfson, H.J., Rigoutsos, I.: Geometric Hashing: An Overview. IEEE Computational Science and Engineering 4(4), 10–21 (1997)
Neumann, J., et al.: Polydioptric camera design and 3d motion estimation. IEEE Conference on Computer Vision and Pattern Recognition II, 294–301 (2003)
Berlekamp, E.R.: Algebraic coding theory, p. xiv+466. McGraw-Hill Book, New York (1968)
MacWilliams, F.J., Sloane, N.J.A.: The theory of error-correcting codes. I. North-Holland Mathematical Library, vol. 16, p. xv+369 (1977)
Wilson, D.B.: Random random walks on \({Z\!Z}_d^2\). Probability Theory and Related Fields 108(4), 441–457 (1997)
Sparkfun, Inc., available on-line at http://www.sparkfun.com
Freescale Semiconductors, Corp. available on-line at http://www.freescale.com
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kirovski, D., Sinclair, M., Wilson, D. (2007). The Martini Synch: Joint Fuzzy Hashing Via Error Correction. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds) Security and Privacy in Ad-hoc and Sensor Networks. ESAS 2007. Lecture Notes in Computer Science, vol 4572. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73275-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-73275-4_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73274-7
Online ISBN: 978-3-540-73275-4
eBook Packages: Computer ScienceComputer Science (R0)