Abstract
It is unfeasible to establish a trusted-third party in ad-hoc wireless networks. Transferring authentication data under a human user’s control and involvement, called Out-Of-Band (OOB) channel, bootstraps device pairing. A number of OOB channels have been proposed. However, none of them is generally accepted due to their lack of adaptability to various devices. In this paper, we introduce a new OOB channel, called MimicGesture, which uses accelerometer-based gesture input. We argue that our OOB channel is suitable for all kinds of mobile devices, including I/O constrained devices, as the accelerometer is small in size and requires low computational overhead. We conducted a usability test in order to check the viability of our channel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Canny, J.: The future of human-computer interaction. Queue-HCI 4, 6 (2006)
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: Distributed Computing Systems Conference, IEEE Press (2006)
Ion, I., Langheinrich, M., Kumaraguru, P., Capkun, S.: Influence of user perception, security needs, and social factors on device pairing method choices. In: Usable Privacy and Security Symposium, ACM Press (2010)
Kainda, R., Flechais, I., Roscoe, A.W.: Usability and security of out-of-band channels in secure device pairing protocols. In: Usable Privacy and Security Symposium, ACM Press (2009)
Kumar, A., Saxena, N., Tsudik, G., Usun, E.: A comparative study of secure device pairing methods. Pervas. Mobile Comput. 5, 6 (2009)
Liu, J., Wang, Z., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uWave: Accelerometer-based gesture recognition and its applications. In: Pervasive Computing and Communications Conference, IEEE Press (2009)
McCune, J.M., Perrig, A.: Seeing-is-believing: Using camera phones for human-verifiable authentication. Int. J. Secur. Netw. 4, 1/2 (2009)
Niezen, G.: The optimization of gesture recognition techniques for resource-constrained devices. Master of Engineering Thesis, University of Pretoria, South Africa (2008)
Prasad, R., Saxena, N.: Efficient device pairing using “human-comparable” synchronized audiovisual patterns. In: Applied Cryptography and Network Security Conference, Springer (2008)
Saxena, N., Uddin, M. B.: Automated device pairing for asymmetric pairing scenarios. In: Information and Communication Security Conference, Springer (2008)
Soriente, C., Tsudik, G., Uzun, E.: BEDA: Button-enabled device association. In: Security for Spontaneous Interaction Workshop (2007)
Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: human-assisted pure audio device pairing. In: Information Security Conference, Springer (2008)
Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Security Protocols Workshop, Springer (1999)
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: International Cryptology Conference, Springer (2005)
Wu, J., Pan, G., Zhang, D., Qi, G., Li, S.: Gesture recognition with a 3-D accelerometer. In: Ubiquitous Intelligence and Computing Conference, Springer (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Chagnaadorj, O., Tanaka, J. (2013). MimicGesture: Secure Device Pairing with Accelerometer-Based Gesture Input. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_7
Download citation
DOI: https://doi.org/10.1007/978-94-007-5857-5_7
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5856-8
Online ISBN: 978-94-007-5857-5
eBook Packages: EngineeringEngineering (R0)