PINtext: A Framework for Secure Communication Based on Context

We propose a framework for secure device-pairing based on contextual information. In contrast to related work, we utilise fuzzy cryptography schemes to establish a common secret among devices and to account for noise in the contextual features. The framework is implemented for ambient audio and its feasibility is demonstrated in a case study. Additionally, we discuss properties of fingerprints from ambient audio and estimate the entropy of fingerprints in statistical tests.

[1]  Heinrich Hußmann,et al.  TreasurePhone: Context-Sensitive User Data Protection on Mobile Phones , 2010, Pervasive.

[2]  Boris Skoric Security with Noisy Data - (Extended Abstract of Invited Talk) , 2010, Information Hiding.

[3]  Josef Langer,et al.  NFC Devices: Security and Privacy , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[4]  Eyal de Lara,et al.  Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.

[5]  John Paul Dunning,et al.  Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.

[6]  Christos N. Pitelis,et al.  Clusters and Globalisation:The Development of Urban and Regional Economies , 2006 .

[7]  René Mayrhofer,et al.  Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.

[8]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[9]  Gregory D. Abowd,et al.  Ubicomp 2007: Ubiquitous Computing , 2008 .

[10]  Stuart E. Schechter,et al.  Can i borrow your phone?: understanding concerns when sharing mobile phones , 2009, CHI.

[11]  Claude Castelluccia,et al.  An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[12]  Mario Huemer,et al.  Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.

[13]  Andreas Krause,et al.  SenSay: a context-aware mobile phone , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  N. Kuiper Tests concerning random points on a circle , 1960 .

[16]  Karen A. Scarfone,et al.  Guidelines on Cell Phone and PDA Security , 2008 .

[17]  Gregory D. Abowd,et al.  Ubicomp 2001: Ubiquitous Computing , 2001, Lecture Notes in Computer Science.

[18]  Stephan Sigg,et al.  Context-based security: state of the art, open research topics and a case study , 2011, CASEMANS '11.

[19]  Albrecht Schmidt,et al.  Physical Prototyping with Smart-its Embedded Ubiquitous Computing Systems , 2022 .

[20]  Eyal de Lara,et al.  Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.

[21]  Rene Mayrhofer,et al.  Shake well before use: two implementations for implicit context authentication , 2007 .

[22]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[23]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[24]  G.S. Smith,et al.  A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.

[25]  André Torre,et al.  Local clusters, trust, confidence and proximity , 2006 .

[26]  René Mayrhofer,et al.  Spontaneous mobile device authentication based on sensor data , 2008, Inf. Secur. Tech. Rep..

[27]  Yusheng Ji,et al.  Entropy of Audio Fingerprints for Unobtrusive Device Authentication , 2011, CONTEXT.

[28]  Patrick Brézillon,et al.  Modeling and Using Context , 1999, Lecture Notes in Computer Science.

[29]  Paul Lukowicz,et al.  Symbolic Object Localization Through Active Sampling of Acceleration and Sound Signatures , 2007, UbiComp.

[30]  Gene Tsudik,et al.  Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers , 2005, ESAS.

[31]  René Mayrhofer,et al.  The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams , 2007, ESAS.

[32]  Bernt Schiele,et al.  Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.

[33]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System With an Efficient Search Strategy , 2003 .

[34]  Lin Cai,et al.  Secret Key Generation and Agreement in UWB Communication Channels , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[35]  Mario Huemer,et al.  Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[36]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[37]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System , 2002, ISMIR.