Abstract
Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. We introduce a new method for device-to-device authentication by shaking devices together. This paper describes two protocols for combining cryptographic authentication techniques with known methods of accelerometer data analysis to the effect of generating authenticated, secret keys. The protocols differ in their design, one being more conservative from a security point of view, while the other allows more dynamic interactions. Three experiments are used to optimize and validate our proposed authentication method.
Original language | English |
---|---|
Title of host publication | Pervasive Computing - 5th International Conference, PERVASIVE 2007, Proceedings |
Pages | 144-161 |
Number of pages | 18 |
DOIs | |
Publication status | Published - 2007 |
Event | 5th International Conference on Pervasive Computing - Toronto, Canada Duration: 13 May 2007 → 16 May 2007 http://www.dgp.toronto.edu/conferences/pervasive2007/ |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 4480 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 5th International Conference on Pervasive Computing |
---|---|
Country/Territory | Canada |
City | Toronto |
Period | 13.05.2007 → 16.05.2007 |
Internet address |