Skip to main content

MimicGesture: Secure Device Pairing with Accelerometer-Based Gesture Input

  • Conference paper
  • First Online:
Book cover Ubiquitous Information Technologies and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 214))

Abstract

It is unfeasible to establish a trusted-third party in ad-hoc wireless networks. Transferring authentication data under a human user’s control and involvement, called Out-Of-Band (OOB) channel, bootstraps device pairing. A number of OOB channels have been proposed. However, none of them is generally accepted due to their lack of adaptability to various devices. In this paper, we introduce a new OOB channel, called MimicGesture, which uses accelerometer-based gesture input. We argue that our OOB channel is suitable for all kinds of mobile devices, including I/O constrained devices, as the accelerometer is small in size and requires low computational overhead. We conducted a usability test in order to check the viability of our channel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Canny, J.: The future of human-computer interaction. Queue-HCI 4, 6 (2006)

    Google Scholar 

  2. Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: Distributed Computing Systems Conference, IEEE Press (2006)

    Google Scholar 

  3. Ion, I., Langheinrich, M., Kumaraguru, P., Capkun, S.: Influence of user perception, security needs, and social factors on device pairing method choices. In: Usable Privacy and Security Symposium, ACM Press (2010)

    Google Scholar 

  4. Kainda, R., Flechais, I., Roscoe, A.W.: Usability and security of out-of-band channels in secure device pairing protocols. In: Usable Privacy and Security Symposium, ACM Press (2009)

    Google Scholar 

  5. Kumar, A., Saxena, N., Tsudik, G., Usun, E.: A comparative study of secure device pairing methods. Pervas. Mobile Comput. 5, 6 (2009)

    Google Scholar 

  6. Liu, J., Wang, Z., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uWave: Accelerometer-based gesture recognition and its applications. In: Pervasive Computing and Communications Conference, IEEE Press (2009)

    Google Scholar 

  7. McCune, J.M., Perrig, A.: Seeing-is-believing: Using camera phones for human-verifiable authentication. Int. J. Secur. Netw. 4, 1/2 (2009)

    Google Scholar 

  8. Niezen, G.: The optimization of gesture recognition techniques for resource-constrained devices. Master of Engineering Thesis, University of Pretoria, South Africa (2008)

    Google Scholar 

  9. Prasad, R., Saxena, N.: Efficient device pairing using “human-comparable” synchronized audiovisual patterns. In: Applied Cryptography and Network Security Conference, Springer (2008)

    Google Scholar 

  10. Saxena, N., Uddin, M. B.: Automated device pairing for asymmetric pairing scenarios. In: Information and Communication Security Conference, Springer (2008)

    Google Scholar 

  11. Soriente, C., Tsudik, G., Uzun, E.: BEDA: Button-enabled device association. In: Security for Spontaneous Interaction Workshop (2007)

    Google Scholar 

  12. Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: human-assisted pure audio device pairing. In: Information Security Conference, Springer (2008)

    Google Scholar 

  13. Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Security Protocols Workshop, Springer (1999)

    Google Scholar 

  14. Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: International Cryptology Conference, Springer (2005)

    Google Scholar 

  15. Wu, J., Pan, G., Zhang, D., Qi, G., Li, S.: Gesture recognition with a 3-D accelerometer. In: Ubiquitous Intelligence and Computing Conference, Springer (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oyuntungalag Chagnaadorj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Chagnaadorj, O., Tanaka, J. (2013). MimicGesture: Secure Device Pairing with Accelerometer-Based Gesture Input. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5857-5_7

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5856-8

  • Online ISBN: 978-94-007-5857-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics