Abstract
It is unfeasible to establish a trusted-third party in ad-hoc wireless networks. Transferring authentication data under a human user’s control and involvement, called Out-Of-Band (OOB) channel, bootstraps device pairing. A number of OOB channels have been proposed. However, none of them is generally accepted due to their lack of adaptability to various devices. In this paper, we introduce a new OOB channel, called MimicGesture, which uses accelerometer-based gesture input. We argue that our OOB channel is suitable for all kinds of mobile devices, including I/O constrained devices, as the accelerometer is small in size and requires low computational overhead. We conducted a usability test in order to check the viability of our channel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Canny, J.: The future of human-computer interaction. Queue-HCI 4, 6 (2006)
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: Distributed Computing Systems Conference, IEEE Press (2006)
Ion, I., Langheinrich, M., Kumaraguru, P., Capkun, S.: Influence of user perception, security needs, and social factors on device pairing method choices. In: Usable Privacy and Security Symposium, ACM Press (2010)
Kainda, R., Flechais, I., Roscoe, A.W.: Usability and security of out-of-band channels in secure device pairing protocols. In: Usable Privacy and Security Symposium, ACM Press (2009)
Kumar, A., Saxena, N., Tsudik, G., Usun, E.: A comparative study of secure device pairing methods. Pervas. Mobile Comput. 5, 6 (2009)
Liu, J., Wang, Z., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uWave: Accelerometer-based gesture recognition and its applications. In: Pervasive Computing and Communications Conference, IEEE Press (2009)
McCune, J.M., Perrig, A.: Seeing-is-believing: Using camera phones for human-verifiable authentication. Int. J. Secur. Netw. 4, 1/2 (2009)
Niezen, G.: The optimization of gesture recognition techniques for resource-constrained devices. Master of Engineering Thesis, University of Pretoria, South Africa (2008)
Prasad, R., Saxena, N.: Efficient device pairing using “human-comparable” synchronized audiovisual patterns. In: Applied Cryptography and Network Security Conference, Springer (2008)
Saxena, N., Uddin, M. B.: Automated device pairing for asymmetric pairing scenarios. In: Information and Communication Security Conference, Springer (2008)
Soriente, C., Tsudik, G., Uzun, E.: BEDA: Button-enabled device association. In: Security for Spontaneous Interaction Workshop (2007)
Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: human-assisted pure audio device pairing. In: Information Security Conference, Springer (2008)
Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Security Protocols Workshop, Springer (1999)
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: International Cryptology Conference, Springer (2005)
Wu, J., Pan, G., Zhang, D., Qi, G., Li, S.: Gesture recognition with a 3-D accelerometer. In: Ubiquitous Intelligence and Computing Conference, Springer (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Chagnaadorj, O., Tanaka, J. (2013). MimicGesture: Secure Device Pairing with Accelerometer-Based Gesture Input. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_7
Download citation
DOI: https://doi.org/10.1007/978-94-007-5857-5_7
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5856-8
Online ISBN: 978-94-007-5857-5
eBook Packages: EngineeringEngineering (R0)