Vibration-based Key Exchange among Multiple Smart Devices on the Desk

Abstract Eavesdropping is an important and real concern in mobile NFC (Near Filed Communication) payment and data sharing applications. Although the DH (Diffie-Hellman) scheme has been widely used in key exchange for secure communications, it may fail in indoor environments due to its vulnerability against man-in-the-middle attack. In this paper, we propose a new vibration-based key exchange among multiple smart devices which are placed on a desk. In this scheme, devices are assumed to be located next to each other with each of them vibrating with patterns converted from a key to be exchanged. The vibration patterns are measured by an accelerometer and each key is recovered from the measured acceleration. The proposed scheme has been implemented using Android smartphones and various experimental performance evaluation results have validated its effectiveness.

[1]  Di Ma,et al.  Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks , 2013, IEEE Transactions on Emerging Topics in Computing.

[2]  Pascal Urien,et al.  Identity-Based Authentication to Address Relay Attacks in Temperature Sensor-enabled Smartcards , 2013 .

[3]  Yao Liu,et al.  Fingerprinting Far Proximity from Radio Emissions , 2014, ESORICS.

[4]  Nigel P. Smart,et al.  AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Xiang Gao,et al.  Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[7]  Zheng Yang,et al.  ToAuth: Towards Automatic Near Field Authentication for Smartphones , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[9]  Di Ma,et al.  Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data , 2012, ESORICS.

[10]  Feng Hao,et al.  Tap-Tap and Pay (TTP): Preventing Man-In-The-Middle Attacks in NFC Payment Using Mobile Sensors , 2014 .

[11]  Di Ma,et al.  Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing , 2013, IEEE Trans. Dependable Secur. Comput..

[12]  Martin Hasler,et al.  New synthesis cycle for LC impedances , 1977 .

[13]  Jiming Chen,et al.  Dynamic Authentication with Sensory Information for the Access Control Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.

[14]  René Mayrhofer,et al.  Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.

[15]  N. Asokan,et al.  Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing , 2014, Financial Cryptography.

[16]  Ahmad-Reza Sadeghi,et al.  Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.

[17]  Eamonn J. Keogh,et al.  Derivative Dynamic Time Warping , 2001, SDM.