Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration

Currently, IoT devices often use wireless technologies to communicate with each other. An example is ad-hoc device pairing such as wireless distribution of meeting materials from a PC to mobile device. The problem in this case is spoofing by an impersonator. In order to solve this problem, we proposed secure device pairing method using similarity between displacement data of a marker displayed on devices and acceleration data obtained from devices. We performed experiments to confirm similarity and whether impersonator can pair with the server. As a result, we found that similarity was low and unstable. Therefore, in this paper, we propose an extended method that marker changes at an interval. These sequence of markers displayed on the device is used to recognize the device by a camera in addition to calculation of the similarity. We performed 3 experiments to confirm the similarity displacement data and examined whether an eavesdropper outside the camera range can perform pairing. Also, we performed pairing of some device together. As a result, average similarity was higher than that of previous method and pairing of three devices succeeded at rate of about 70%.

[1]  Eyal de Lara,et al.  Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.

[2]  Tomoaki Ohtsuki,et al.  Room-level proximity detection based on RSS of dual-band Wi-Fi signals , 2016, 2016 IEEE International Conference on Communications (ICC).

[3]  N. Asokan,et al.  Secure Device Pairing Based on a Visual Channel: Design and Usability Study , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Mahsan Rofouei,et al.  Your phone or mine?: fusing body, touch and device sensing for multi-user device-display interaction , 2012, CHI.

[5]  Koichi Hashimoto,et al.  Identifying a moving object with an accelerometer in a camera view , 2008, 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[6]  Hrvoje Benko,et al.  CrossMotion: Fusing Device and Image Motion for User Identification, Tracking and Device Association , 2014, ICMI.

[7]  Naonobu Okazaki,et al.  Proposal and Evaluation of Secure Device Pairing Method with Camera and Accelerometer , 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW).

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.