Shake well before use: authentication based on accelerometer data
read more
Citations
uWave: Accelerometer-based personalized gesture recognition and its applications
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
Privacy in mobile technology for personal healthcare
Amigo: proximity-based authentication of mobile devices
Secure Communication Based on Ambient Audio
References
New Directions in Cryptography
Finding collisions in the full SHA-1
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Related Papers (5)
Frequently Asked Questions (18)
Q2. How many bits per second should be enough to achieve a security level of 128 bits?
When (pessimistically) estimating the entropy rate at around 7 bits per second, 20 seconds of shaking should be sufficient to achieve a security level of 128 bits.
Q3. What are the advantages of protocol 2?
Protocol 2 offers benefits for devices with limited resources, large wireless networks, and quick interaction, while the authors recommend using protocol 1 for higher security demands.
Q4. How many bits of entropy can be generated by overlapping feature vectors?
Overlapping feature vectors will have even less entropy, but the authors can still assume to generate at least 7 bits entropy per second using their second protocol.
Q5. How many different feature vectors were generated during the first experiment?
12220 different feature vectors were generated during the first experiment, corresponding to an entropy of 13.58 bits per feature vector.
Q6. What is the disadvantage of splitting task 5.1 into two phases?
The disadvantage of splitting task 5.1 into two phases is potentially a larger delay for authentication, and the disadvantage of using DH is higher computational load.
Q7. Why did the authors use the combination that minimizes 4eP + eN?
Due to the larger parameter search space with higher dimensionality, for the second protocol the authors use the combination that minimizes 4eP + eN .
Q8. How do the authors limit the burden placed on users?
By combining the explicit user interaction – taking two devices into one hand and shaking them as an indication that they should pair – with implicit authentication, the authors limit the burden placed on users.
Q9. Why is the coherence value based on the number of averaged slices?
Because the significance of coherence values depends on the number of averaged slices n – the more slices, the lower the coherence2
Q10. How many subjects were asked to read a short list of tips for improving the similarity values?
Subjects were asked to read a short list of tips for improving the similarity values (to align the devices roughly along the movement axis, to keep the wrist stiff, to shake quickly and vigorously, and to keep the elbow steady) and then to use interactive trial&error for achieving successful authentication.
Q11. What is the advantage of using symmetric cryptography?
The advantage is that cryptographic key material can be created using only symmetric cryptography, which is more suitable for embedded devices.
Q12. How many people were asked to shake ping-pong balls?
51 people, 19 female aged between 20 and 55, 32 male aged between 20 and 58, of different professions, including cafeteria staff and other non-office workers, were asked to shake both ping-pong balls, explicitly without further instructions.
Q13. What is the aim of the feature extraction task?
In deciding if time series are similar enough for authentication, the aim of the feature extraction task is twofold: a) to extract feature values that are robust to small variations in the shaking patterns and to sampling noise and b) to extract 1
Q14. How many different pairs contributed to this experiment?
8 different pairs contributed 8 complete data sets of 20 samples each and 4 incomplete sets with less samples: 5 samples each for both subjects using their left hands, both their right, one subject left, the other right, and vice versa.
Q15. How much is the security level of protocol 1 against offline attacks?
Although the authors can not currently quantify the security level against such unlikely online attacks, the security level of protocol 1 against offline attacks is 128 bits even after only 3 seconds of shaking (assuming DH to be secure).
Q16. What is the way to use a shared secret key?
This shared string is not directly suitable to act as a secret key for cryptographic primitives, because it is neither of defined length (e.g. 128 bits) nor distributed uniformly.
Q17. Why is the shaking used in authentication protocol?
This shaking serves to prevent signal strength analysis, but is, in contrast to their work, not used directly as input to the authentication protocol.
Q18. What is the trade-off between the two protocols?
For both protocols, there is a trade-off between usability and security that can be exploited by applications and users depending on their requirements.