Secure Context-based Pairing for Unprecedented Devices

We introduce context-based pairing protocols that integrate into common distributed device encryption schemes for device management and access control. In particular, we suggest three pairing protocols that integrate implicit proximity-based device pairing to increase convenience and security. From these protocols, we implemented a secure device pairing approach conditioned on natural, unconstrained spoken interaction in a smart environment. In particular, our approach exploits speech recognition to identify devices to pair from free-form spoken interaction and restricts the pairing to the right device in proximity by generating secure keys from audio fingerprints of the same spoken interaction.

[1]  Antonio Garzon,et al.  MASK: Robust Local Features for Audio Fingerprinting , 2012, 2012 IEEE International Conference on Multimedia and Expo.

[2]  Mario Huemer,et al.  Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.

[3]  Stephan Sigg,et al.  BANDANA — Body area network device-to-device authentication using natural gAit , 2016, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[4]  Ahmad-Reza Sadeghi,et al.  Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.

[5]  Kai Oliver Arras,et al.  Audio-based human activity recognition using Non-Markovian Ensemble Voting , 2012, 2012 IEEE RO-MAN: The 21st IEEE International Symposium on Robot and Human Interactive Communication.

[6]  Eyal de Lara,et al.  Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.

[7]  René Mayrhofer,et al.  A Survey of User Interaction for Spontaneous Device Association , 2014, CSUR.

[8]  Yusheng Ji,et al.  PINtext: A Framework for Secure Communication Based on Context , 2011, MobiQuitous.

[9]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[10]  Petteri Nurmi,et al.  Using contextual co-presence to strengthen Zero-Interaction Authentication:Design, integration and usability , 2015 .

[11]  Avery Wang,et al.  An Industrial Strength Audio Search Algorithm , 2003, ISMIR.

[12]  Mario Di Francesco,et al.  MoCHA: Augmenting pervasive displays through mobile devices and web-based technologies , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[13]  Eyal de Lara,et al.  Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.

[14]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System , 2002, ISMIR.

[15]  Thomas Kunz,et al.  Wireless Fingerprints Inside a Wireless Sensor Network , 2015, ACM Trans. Sens. Networks.

[16]  Tuomas Aura,et al.  Commitment-based device pairing with synchronized drawing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[17]  Yongjin Wang,et al.  Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.

[18]  René Mayrhofer,et al.  Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.

[19]  Tuomas Aura,et al.  Commitment-based device-pairing protocol with synchronized drawings and comparison metrics , 2015 .

[20]  Gerhard Widmer,et al.  Quad-Based Audio Fingerprinting Robust to Time and Frequency Scaling , 2014, DAFx.

[21]  F. Moore,et al.  Polynomial Codes Over Certain Finite Fields , 2017 .

[22]  René Mayrhofer,et al.  The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams , 2007, ESAS.

[23]  Rong Jin,et al.  MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers , 2016, IEEE Transactions on Information Forensics and Security.

[24]  Yusheng Ji,et al.  AdhocPairing : Spontaneous audio based secure device pairing for Android mobile devices , 2012 .

[25]  Ashok Jhunjhunwala,et al.  Scalable and robust audio fingerprinting method tolerable to time-stretching , 2015, 2015 IEEE International Conference on Digital Signal Processing (DSP).

[26]  Stephan Sigg,et al.  Secure Communication Based on Ambient Audio , 2013, IEEE Transactions on Mobile Computing.