Technical Report: Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test

The increasingly sophisticated at-home screening systems for obstructive sleep apnea (OSA), integrated with both contactless and contact-based sensing modalities, bring convenience and reliability to remote chronic disease management. However, the device pairing processes between system components are vulnerable to wireless exploitation from a noncompliant user wishing to manipulate the test results. This work presents SIENNA, an insider-resistant context-based pairing protocol. SIENNA leverages JADE-ICA to uniquely identify a user’s respiration pattern within a multi-person environment and fuzzy commitment for automatic device pairing, while using friendly jamming technique to prevent an insider with knowledge of respiration patterns from acquiring the pairing key. Our analysis and test results show that SIENNA can achieve reliable (> 90% success rate) device pairing under a noisy environment and is robust against the attacker with full knowledge of the context information.

[1]  Anish Arora,et al.  Dialog codes for secure wireless communications , 2009, 2009 International Conference on Information Processing in Sensor Networks.

[2]  Olga Boric-Lubecke,et al.  Good Night: Sleep Monitoring Using a Physiological Radar Monitoring System Integrated with a Polysomnography System , 2015, IEEE Microwave Magazine.

[3]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[4]  B. Moor,et al.  Independent component analysis based on higher-order statistics only , 1996, Proceedings of 8th Workshop on Statistical Signal and Array Processing.

[5]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Santiago Figueroa Lorenzo,et al.  A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis , 2019, Technologies.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Ahmad-Reza Sadeghi,et al.  Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.

[9]  Ming Li,et al.  iJam with channel randomization , 2020, Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks.

[10]  Ming Li,et al.  ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.

[11]  Shlomo Shamai,et al.  Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[12]  Matthias Hollick,et al.  Lockpicking physical layer key exchange: weak adversary models invite the thief , 2015, WISEC.

[13]  D. Jouan-Rimbaud Bouveresse,et al.  Independent components analysis with the JADE algorithm , 2012 .

[14]  Hao He,et al.  Extracting Multi-Person Respiration from Entangled RF Signals , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..