Survey and Systematization of Secure Device Pairing

Secure device pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this paper, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis. The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.

[1]  Jean Leneutre,et al.  Formal Analysis of Secure Device Pairing Protocols , 2014, 2014 IEEE 13th International Symposium on Network Computing and Applications.

[2]  Karen A. Scarfone,et al.  Guide to Bluetooth Security , 2008 .

[3]  Sean White,et al.  RhythmLink: securely pairing I/O-constrained devices by tapping , 2011, UIST.

[4]  Romit Roy Choudhury,et al.  Listening through a Vibration Motor , 2016, MobiSys.

[5]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[6]  Jason I. Hong,et al.  Exploring capturable everyday memory for autobiographical authentication , 2013, UbiComp.

[7]  Adi Shamir,et al.  How to expose an eavesdropper , 1984, CACM.

[8]  René Mayrhofer,et al.  On the Security of Ultrasound as Out-of-band Channel , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[9]  Xiaohui Liang,et al.  Wanda: Securely introducing mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[10]  N. Asokan,et al.  Contextual Proximity Detection in the Face of Context-Manipulating Adversaries , 2015, ArXiv.

[11]  TsudikGene,et al.  A comparative study of secure device pairing methods , 2009 .

[12]  Claudio Soriente,et al.  BEDA: Button-Enabled Device Pairing , 2007, IACR Cryptol. ePrint Arch..

[13]  Rong Jin,et al.  MagPairing: Exploiting magnetometers for pairing smartphones in close proximity , 2014, 2014 IEEE Conference on Communications and Network Security.

[14]  Yu Cheng,et al.  Secure device-to-device communications over WiFi direct , 2016, IEEE Network.

[15]  Sourangsu Banerji,et al.  On IEEE 802.11: Wireless LAN Technology , 2013, ArXiv.

[16]  Kui Ren,et al.  Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[17]  Dina Katabi,et al.  Secure In-Band Wireless Pairing , 2011, USENIX Security Symposium.

[18]  Tadayoshi Kohno,et al.  RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications , 2008, CCS.

[19]  Salil S. Kanhere,et al.  A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..

[20]  Kim-Kwang Raymond Choo,et al.  Bridging the Air Gap: Inaudible Data Exfiltration by Insiders , 2014, AMCIS.

[21]  Rodrigo Roman,et al.  KeyLED - transmitting sensitive data over out-of-band channels in wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[22]  Eyal de Lara,et al.  Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.

[23]  Romesh Nagarajah,et al.  Ultrasonic Fluid Quantity Measurement in Dynamic Vehicular Applications: A Support Vector Machine Approach , 2013 .

[24]  Yan Zhang,et al.  Security in RFID and Sensor Networks , 2009 .

[25]  Steven J. Murdoch,et al.  Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.

[26]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[27]  Qian Zhang,et al.  Touch-and-guard: secure pairing through hand resonance , 2016, UbiComp.

[28]  Srdjan Capkun,et al.  Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels , 2006, IEEE Transactions on Dependable and Secure Computing.

[29]  Srdjan Capkun,et al.  Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.

[30]  Guoliang Xue,et al.  A Proximity Authentication System for Smartphones , 2016, IEEE Transactions on Dependable and Secure Computing.

[31]  David Kotz,et al.  LightTouch: Securely connecting wearables to ambient displays with user intent , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[32]  Jaime Lloret,et al.  IPTV performance in IEEE 802.11n WLANs , 2010, 2010 IEEE Globecom Workshops.

[33]  Dawn Song,et al.  Hash Visualization: a New Technique to improve Real-World Security , 1999 .

[34]  Paul Jones,et al.  Secrets and Lies: Digital Security in a Networked World , 2002 .

[35]  Gierad Laput,et al.  Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks , 2017, CHI.

[36]  Di Ma,et al.  Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing , 2012, IEEE Transactions on Dependable and Secure Computing.

[37]  Christof Paar,et al.  Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.

[38]  Jani Suomalainen Smartphone assisted security pairings for the Internet of Things , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).

[39]  Jens Grubert,et al.  Challenges in mobile multi-device ecosystems , 2016, mUX: The Journal of Mobile User Experience.

[40]  Michael Hanspach,et al.  On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..

[41]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.

[42]  Volker Roth,et al.  Simple and effective defense against evil twin access points , 2008, WiSec '08.

[43]  Xiang Gao,et al.  Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[44]  Matthias Hollick,et al.  DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices , 2016, WISEC.

[45]  Hung-Min Sun,et al.  A Study of User-Friendly Hash Comparison Schemes , 2009, 2009 Annual Computer Security Applications Conference.

[46]  Tuomas Aura,et al.  Commitment-based device pairing with synchronized drawing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[47]  Edward W. Knightly,et al.  The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications , 2015, VLCS@MobiCom.

[48]  René Mayrhofer,et al.  Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.

[49]  Cong Wang,et al.  SBVLC: Secure barcode-based visible light communication for smartphones , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[50]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[51]  Nitesh Saxena,et al.  Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior , 2009, ACNS.

[52]  Wenye Wang,et al.  Review and evaluation of security threats on the communication networks in the smart grid , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[53]  Claude Castelluccia,et al.  Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.

[54]  A. B. M. Musa,et al.  Tracking unmodified smartphones using wi-fi monitors , 2012, SenSys '12.

[55]  Nitesh Saxena,et al.  Playful security: A computer game for secure wireless device pairing , 2011, 2011 16th International Conference on Computer Games (CGAMES).

[56]  Ashwin Ashok,et al.  Whose move is it anyway? Authenticating smart wearable devices using unique head movement patterns , 2016, 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[57]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[58]  Markus G. Kuhn,et al.  So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.

[59]  Chunming Hu,et al.  Enhancing reliability to boost the throughput over screen-camera links , 2014, MobiCom.

[60]  Joe F. Chicharo,et al.  Unfairness and capture behaviour in 802.11 adhoc networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[61]  John Paul Dunning,et al.  Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.

[62]  Sai Shankar Nandagopalan,et al.  WiGig and IEEE 802.11ad - For multi-gigabyte-per-second WPAN and WLAN , 2012, ArXiv.

[63]  Nitesh Saxena,et al.  Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns , 2008, ACNS.

[64]  Jaafar M. H. Elmirghani,et al.  20 Gb/s Mobile Indoor Visible Light Communication System Employing Beam Steering and Computer Generated Holograms , 2015, Journal of Lightwave Technology.

[65]  Frédo Durand,et al.  The visual microphone , 2014, ACM Trans. Graph..

[66]  Andrzej Glowacz,et al.  Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects , 2013, 2013 International Conference on Availability, Reliability and Security.

[67]  Di Ma,et al.  Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data , 2012, ESORICS.

[68]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[69]  Dina Katabi,et al.  PixNet: interference-free wireless links using LCD-camera pairs , 2010, MobiCom.

[70]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[71]  Nitesh Saxena,et al.  Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise , 2016, WISEC.

[72]  Punith P. Salian,et al.  Visible Light Communication , 2013, 2013 Texas Instruments India Educators' Conference.

[73]  Soonuk Seol,et al.  Smart phone assisted personal IoT service , 2015 .

[74]  Eyal de Lara,et al.  Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.

[75]  Xiang-Yang Li,et al.  Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.

[76]  Mahmudur Rahman,et al.  Seeing is not believing: visual verifications through liveness analysis using mobile devices , 2013, ACSAC.

[77]  Cecilia Mascolo,et al.  Beyond location check-ins: Exploring physical and soft sensing to augment social check-in apps , 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[78]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[79]  Dean Anthony Gratton The Handbook of Personal Area Networking Technologies and Protocols: Bluetooth low energy , 2013 .

[80]  Nitesh Saxena,et al.  Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing , 2013, IEEE Transactions on Information Forensics and Security.

[81]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[82]  Parth H. Pathak,et al.  Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges , 2015, IEEE Communications Surveys & Tutorials.

[83]  Rene Mayrhofer,et al.  An Authentication Protocol using Ultrasonic Ranging , 2006 .

[84]  René Mayrhofer,et al.  SAPHE: simple accelerometer based wireless pairing with heuristic trees , 2012, MoMM '12.

[85]  Ji Won Yoon,et al.  Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack , 2015, WISA.

[86]  Guoliang Xing,et al.  VINCE: Exploiting visible light sensing for smartphone-based NFC systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[87]  Romit Roy Choudhury,et al.  Ripple: Communicating through Physical Vibration , 2015, NSDI.

[88]  Nitesh Saxena,et al.  Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals , 2015, CANS.

[89]  Bart Preneel,et al.  On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them , 2016, ACSAC.

[90]  Max Maass,et al.  NFCGate: an NFC relay application for Android , 2015, WISEC.

[91]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[92]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[93]  Ersin Uzun,et al.  Usability Analysis of Secure Pairing Methods , 2007, Financial Cryptography.

[94]  Arun Kumar,et al.  Pairing devices for social interactions: a comparative usability evaluation , 2011, CHI.

[95]  Stephan Sigg,et al.  Secure Communication Based on Ambient Audio , 2013, IEEE Transactions on Mobile Computing.

[96]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[97]  Paul Gardner-Stephen,et al.  The Village Telco project: a reliable and practical wireless mesh telephony infrastructure , 2011, EURASIP J. Wirel. Commun. Netw..

[98]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[99]  Guoliang Xing,et al.  nShield: a noninvasive NFC security system for mobiledevices , 2014, MobiSys.

[100]  Josef Hallberg,et al.  Positioning with Bluetooth, IrDA and RFID , 2002 .

[101]  Nitesh Saxena,et al.  All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines , 2015, ESORICS.

[102]  P. Carayon,et al.  Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. , 2007, Applied ergonomics.

[103]  Di Ma,et al.  A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems , 2014, Secur. Commun. Networks.

[104]  N. Asokan,et al.  Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks , 2015, NDSS.

[105]  Kao-Cheng Huang,et al.  Millimeter-Wave Communication Systems , 2011, CMOS Millimeter-Wave Integrated Circuits for Next Generation Wireless Communication Systems.

[106]  Guoliang Xing,et al.  COBRA: color barcode streaming for smartphone systems , 2012, MobiSys '12.

[107]  Antonio Lioy,et al.  Dependability in Wireless Networks: Can We Rely on WiFi? , 2007, IEEE Security & Privacy.

[108]  Ivan Martinovic,et al.  STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification , 2017, 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[109]  N. Asokan,et al.  Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing , 2014, Financial Cryptography.

[110]  Stephan Sigg,et al.  BANDANA — Body area network device-to-device authentication using natural gAit , 2016, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[111]  Tim Kindberg,et al.  Validating and Securing Spontaneous Associations between Wireless Devices , 2003, ISC.

[112]  N. Asokan,et al.  Secure Device Pairing Based on a Visual Channel: Design and Usability Study , 2011, IEEE Transactions on Information Forensics and Security.

[113]  Srdjan Capkun,et al.  Are We Really Close? Verifying Proximity in Wireless Systems , 2017, IEEE Security & Privacy.

[114]  Sridhar Rajagopal,et al.  IEEE 802.15.7 visible light communication: modulation schemes and dimming support , 2012, IEEE Communications Magazine.

[115]  Theodore S. Rappaport,et al.  Millimeter Wave Mobile Communications for 5G Cellular: It Will Work! , 2013, IEEE Access.

[116]  Dinko Begusic,et al.  Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User , 2012, IEEE Transactions on Mobile Computing.

[117]  Mario Cagalj,et al.  Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices , 2016, Secur. Commun. Networks.

[118]  Xiaomin Liu,et al.  Fast Secure Computation of Set Intersection , 2010, SCN.

[119]  Michael Rohs,et al.  User-defined gestures for connecting mobile phones, public displays, and tabletops , 2010, Mobile HCI.

[120]  Shusen Yang,et al.  Rapid, User-Transparent, and Trustworthy Device Pairing for D2D-Enabled Mobile Crowdsourcing , 2017, IEEE Transactions on Mobile Computing.

[121]  Zhen Ling,et al.  Blind Recognition of Touched Keys on Mobile Devices , 2014, CCS.

[122]  Mudhakar Srivatsa,et al.  Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.

[123]  Christian Gehrmann,et al.  Manual authentication for wireless devices , 2004 .

[124]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[125]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[126]  W. Buxton Human-Computer Interaction , 1988, Springer Berlin Heidelberg.

[127]  Hanaan Rosenthal The Business of Automation , 2004 .

[128]  S. Bolanowski,et al.  Four channels mediate the mechanical aspects of touch. , 1988, The Journal of the Acoustical Society of America.

[129]  Gerhard P. Hancke,et al.  Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones , 2010, RFIDSec.

[130]  Richard Sharp,et al.  Audio networking: the forgotten wireless technology , 2005, IEEE Pervasive Computing.

[131]  René Mayrhofer,et al.  UACAP: A Unified Auxiliary Channel Authentication Protocol , 2013, IEEE Transactions on Mobile Computing.

[132]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[133]  Keith Mayes,et al.  When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data , 2016, ArXiv.

[134]  罗国昭 Wi-Fi Direct技术发布 , 2010 .

[135]  Tokumaru Michiko Millimeter-Wave Communication Systems , 2009 .

[136]  Nitesh Saxena,et al.  Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics , 2016, ArXiv.

[137]  Budi Arief,et al.  Computer security impaired by legitimate users , 2004, Comput. Secur..

[138]  George T. Amariucai,et al.  An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID , 2011, RFIDSec.

[139]  Shiwen Mao,et al.  Advanced Wireless LAN Technologies: IEEE 802.11AC and Beyond , 2015, GETMBL.

[140]  Wei Wang,et al.  vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge , 2015, ESORICS.

[141]  Adrian Perrig,et al.  SafeSlinger: easy-to-use and secure public-key exchange , 2013, MobiCom.

[142]  Prasant Mohapatra,et al.  Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas , 2011, NDSS.

[143]  Ahmad-Reza Sadeghi,et al.  Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.

[144]  René Mayrhofer,et al.  A Human-Verifiable Authentication Protocol Using Visible Laser Light , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[145]  Harald Haas Visible light communication: Tutorial , 2015 .

[146]  Srdjan Capkun,et al.  Influence of user perception, security needs, and social factors on device pairing method choices , 2010, SOUPS.

[147]  Lara Khansa,et al.  How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management , 2009, Computers & security.

[148]  Michael Sirivianos,et al.  Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[149]  Karen A. Scarfone,et al.  Guide to Bluetooth Security , 2008 .

[150]  Yang Wang,et al.  Serial hook-ups: a comparative usability study of secure device pairing methods , 2009, SOUPS.

[151]  J. Langer,et al.  Applying relay attacks to Google Wallet , 2013, 2013 5th International Workshop on Near Field Communication (NFC).

[152]  Nicu Sebe,et al.  Multimodal Human Computer Interaction: A Survey , 2005, ICCV-HCI.

[153]  Haitham S. Cruickshank,et al.  Secure Device Pairing: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[154]  Michael J. Rycroft,et al.  Understanding GPS. Principles and Applications , 1997 .

[155]  Claudio Soriente,et al.  HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.

[156]  Yina Ye,et al.  Checksum gestures: continuous gestures as an out-of-band channel for secure pairing , 2015, UbiComp.

[157]  Carlisle M. Adams,et al.  On Acoustic Covert Channels Between Air-Gapped Systems , 2014, FPS.

[158]  N. Asokan,et al.  Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[159]  Paul Gardner-Stephen,et al.  The Serval Project: Practical Wireless Ad-Hoc Mobile Telecommunications , 2011 .

[160]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[161]  Claude Castelluccia,et al.  Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.

[162]  Wei Wang,et al.  WAVE: Secure Wireless Pairing Exploiting Human Body Movements , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[163]  Martin Welk,et al.  Tempest in a Teapot: Compromising Reflections Revisited , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[164]  Peter Howell,et al.  Signals and Systems for Speech and Hearing , 1991 .

[165]  S. Weis RFID ( Radio Frequency Identification ) : Principles and Applications , 2007 .

[166]  Feng Hao,et al.  Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment , 2015, SSR.

[167]  Pedro José Marrón,et al.  Enlighten me! secure key assignment in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[168]  Laura A. Dabbish,et al.  Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation , 2014, CCS.

[169]  Gerhard P. Hancke,et al.  Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones , 2011, IACR Cryptol. ePrint Arch..

[170]  Hans-Werner Gellersen,et al.  Usability classification for spontaneous device association , 2011, Personal and Ubiquitous Computing.

[171]  Nitesh Saxena,et al.  Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios , 2014, International Journal of Information Security.

[172]  A. W. Roscoe,et al.  Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.

[173]  Qian Zhang,et al.  Secret from Muscle: Enabling Secure Pairing with Electromyography , 2016, SenSys.

[174]  Athanasios V. Vasilakos,et al.  A survey of millimeter wave communications (mmWave) for 5G: opportunities and challenges , 2015, Wireless Networks.

[175]  Matthias Hollick,et al.  Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control , 2017, WISEC.

[176]  Lujo Bauer,et al.  Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement , 2011, ACSAC '11.

[177]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[178]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[179]  Edward W. Knightly,et al.  Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[180]  Dawn Song,et al.  Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.

[181]  A. W. Roscoe,et al.  Two heads are better than one: security and usability of device associations in group scenarios , 2010, SOUPS.

[182]  René Mayrhofer,et al.  A Survey of User Interaction for Spontaneous Device Association , 2014, CSUR.

[183]  Keijo Haataja,et al.  Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures , 2010, IEEE Transactions on Wireless Communications.

[184]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.