Gait-Key

Recent years have witnessed a remarkable growth in the number of smart wearable devices. For many of these devices, an important security issue is to establish an authenticated communication channel between legitimate devices to protect the subsequent communications. Due to the wireless nature of the communication and the extreme resource constraints of sensor devices, providing secure, efficient, and user-friendly device pairing is a challenging task. Traditional solutions for device pairing mostly depend on key predistribution, which is unsuitable for wearable devices in many ways. In this article, we design Gait-Key, a shared secret key generation scheme that allows two legitimate devices to establish a common cryptographic key by exploiting users’ walking characteristics (gait). The intuition is that the sensors on different locations on the same body experience similar accelerometer signals when the user is walking. However, one main challenge is that the accelerometer also captures motion signals produced by other body parts (e.g., swinging arms). We address this issue by using the blind source separation technique to extract the informative signal produced by the unique gait patterns. Our experimental results show that Gait-Key can generate a common 128-bit key for two legitimate devices with 98.3% probability. To demonstrate the feasibility, the proposed key generation scheme is implemented on modern smartphones. The evaluation results show that the proposed scheme can run in real time on modern mobile devices and incurs low system overhead.

[1]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[2]  Guang-Zhong Yang,et al.  Source recovery for body sensor network , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[3]  Guang-Zhong Yang,et al.  Detecting Walking Gait Impairment with an Ear-worn Sensor , 2009, 2009 Sixth International Workshop on Wearable and Implantable Body Sensor Networks.

[4]  Zhong Ming,et al.  Accuracy-aware wireless indoor localization: Feasibility and applications , 2016, J. Netw. Comput. Appl..

[5]  Moustafa Youssef,et al.  It's the Human that Matters: Accurate User Orientation Estimation for Mobile Computing Applications , 2014, MobiQuitous.

[6]  G. Srivastava,et al.  ICA-based procedures for removing ballistocardiogram artifacts from EEG data acquired in the MRI scanner , 2005, NeuroImage.

[7]  J. Bibb Cain,et al.  Error-Correction Coding for Digital Communications , 1981 .

[8]  Bart De Schutter,et al.  DAISY : A database for identification of systems , 1997 .

[9]  Vince D. Calhoun,et al.  A review of group ICA for fMRI data and ICA for joint inference of imaging, genetic, and ERP data , 2009, NeuroImage.

[10]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[11]  Bernt Schiele,et al.  Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.

[12]  Ming Li,et al.  ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks , 2013, WiSec '13.

[13]  Aapo Hyvärinen,et al.  Fast and robust fixed-point algorithms for independent component analysis , 1999, IEEE Trans. Neural Networks.

[14]  Neil W. Bergmann,et al.  Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[15]  Zhen Ji,et al.  Secure interoperation of identity managements among different circles of trust , 2011, Comput. Stand. Interfaces.

[16]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[17]  René Mayrhofer,et al.  Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.

[18]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[19]  MengChu Zhou,et al.  An Effective Scheme for QoS Estimation via Alternating Direction Method-Based Matrix Factorization , 2019, IEEE Transactions on Services Computing.

[20]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[21]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[22]  Mario Huemer,et al.  Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.

[23]  Blake Hannaford,et al.  "Are You with Me?" - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person , 2004, Pervasive.

[24]  Mun Choon Chan,et al.  Pallas: Self-Bootstrapping Fine-Grained Passive Indoor Localization Using WiFi Monitors , 2017, IEEE Transactions on Mobile Computing.

[25]  E. Oja,et al.  Independent Component Analysis , 2013 .

[26]  Colleen Swanson,et al.  SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.

[27]  Deokjai Choi,et al.  Secure and Privacy Enhanced Gait Authentication on Smart Phone , 2014, TheScientificWorldJournal.

[28]  Luis Hernández Encinas,et al.  A crypto-biometric scheme based on iris-templates with fuzzy extractors , 2012, Inf. Sci..

[29]  Quan Yuan,et al.  A framework for protecting personal information and privacy , 2015, Secur. Commun. Networks.

[30]  Emanuele Maiorana,et al.  Biometric cryptosystem using function based on-line signature recognition , 2010, Expert Syst. Appl..

[31]  Sanjay Jha,et al.  Secure key generation and distribution protocol for wearable devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[32]  Neil W. Bergmann,et al.  Sensor-Assisted Face Recognition System on Smart Glass via Multi-View Sparse Representation Classification , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[33]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[34]  Arnaud Delorme,et al.  EEGLAB: an open source toolbox for analysis of single-trial EEG dynamics including independent component analysis , 2004, Journal of Neuroscience Methods.

[35]  Seungjin Choi,et al.  Independent Component Analysis , 2009, Handbook of Natural Computing.

[36]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[37]  T. Sejnowski,et al.  Human Brain Mapping 6:368–372(1998) � Independent Component Analysis of fMRI Data: Examining the Assumptions , 2022 .

[38]  He Wang,et al.  I am a smartphone and i can tell my user's walking direction , 2014, MobiSys.

[39]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[40]  Sanjay Jha,et al.  DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).

[41]  MingZhong,et al.  Accuracy-aware wireless indoor localization , 2016 .

[42]  Erkki Oja,et al.  Independent Component Analysis Aapo Hyvärinen, Juha Karhunen, , 2004 .

[43]  Ganesh R. Naik,et al.  Using Blind Source Separation on accelerometry data to analyze and distinguish the toe walking gait from normal gait in ITW children , 2014, Biomed. Signal Process. Control..

[44]  Mikkel N. Schmidt,et al.  Single-channel speech separation using sparse non-negative matrix factorization , 2006, INTERSPEECH.

[45]  Carlisle M. Adams,et al.  You are the key: Generating cryptographic keys from voice biometrics , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[46]  Sanjay Jha,et al.  Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.

[47]  Ken Hinckley,et al.  Synchronous gestures for multiple persons and computers , 2003, UIST '03.

[48]  Peng Li,et al.  An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..

[49]  Ying Chen,et al.  Speech Separation Based on Improved Fast ICA with Kurtosis Maximization of Wavelet Packet Coefficients , 2014, WorldCIST.

[50]  Sanjay Jha,et al.  SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.

[51]  Qian Zhang,et al.  Secret from Muscle: Enabling Secure Pairing with Electromyography , 2016, SenSys.

[52]  Mahbub Hassan,et al.  KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting , 2017, NDSS.

[53]  M. P. Murray Gait as a total pattern of movement. , 1967, American journal of physical medicine.

[54]  David Kotz,et al.  Recognizing whether sensors are on the same body , 2011, Pervasive Mob. Comput..