Secure key generation and distribution protocol for wearable devices

Smart wearable devices have enormous applications in today's world and hence their usage is increasing significantly. As these devices communicate using wireless medium, the communication must be protected from eavesdropping by using shared secret keys for data encryption. In many applications, it is essential to use a common secret key for secured communication among multiple devices. In this paper, we present our novel secret key generation and distribution protocol exploiting accelerometer data collected from smart wearable devices. We propose (i) source separation method for processing accelerometer sensor data, and (ii) key distribution protocol based on Fuzzy vault. Our scheme is information theoretically secure and our experimental results show that the maximum key generation rate of our scheme is 50 bps which is suitable for practical applications.

[1]  Yantian Hou,et al.  Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel , 2013, WiSec '13.

[2]  Sanjay Jha,et al.  Secret Key Generation by Virtual Link Estimation , 2015, BODYNETS.

[3]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[4]  Sanjay Jha,et al.  Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.

[5]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[6]  Sanjay Jha,et al.  Poster: Were You in the Cafe Yesterday?: Location Proof Generation & Verification for Mobile Users , 2015, SenSys.

[7]  Sanjay Jha,et al.  DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).

[8]  Sanjay Jha,et al.  iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel , 2015, AsiaCCS.

[9]  René Mayrhofer,et al.  Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices , 2009, IEEE Transactions on Mobile Computing.

[10]  David Kotz,et al.  Recognizing whether sensors are on the same body , 2011, Pervasive Mob. Comput..

[11]  Ming Li,et al.  ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks , 2013, WiSec '13.

[12]  Sanjay Jha,et al.  SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks , 2014, RFIDSec.

[13]  Erkki Oja,et al.  Independent Component Analysis , 2001 .