skip to main content
10.1145/3372297.3417288acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Harnessing the Ambient Radio Frequency Noise for Wearable Device Pairing

Authors Info & Claims
Published:02 November 2020Publication History

ABSTRACT

Wearable devices that capture user's rich information regarding their health conditions and daily activities have unmet pairing needs. Today's solutions, which primarily rely on human involvement, are cumbersome, error-prone, and do not scale well. Despite some prior efforts trying to fill this gap, they either rely on some sophisticated sensors, such as electromyogram (EMG) or electrocardiogram (ECG) pads that may not universally exist, or non-trivial design of communication transceivers that cannot be found easily on current commercial devices. Therefore, a pairing scheme for wearable devices that is secure, practical, and convenient is in dire need. In this paper, we propose a novel approach that leverages ambient radio frequency (RF) noise. Our design is based on a key observation that received RF noise power measured in the logarithmic scale at different parts of a human body surface experience the same variation trend, whereas those from different human bodies or off the body are distinct. Wearables make use of the observed noise as the entropy source for the proposed pairing protocol. Extensive experiments show that our scheme has an equal error rate (EER) as low as 1.4% for pairing. Its key generation rate reaches 138 bits/sec, which beats so-far existing pairing schemes. Besides, our scheme can be efficiently executed within 0.97 s. Its incurred energy consumption is as low as 0.27 J for the entire pairing procedure.

Skip Supplemental Material Section

Supplemental Material

Copy of CCS2020_fpx463_WenqiangJin - Ami Eckard-Lee.mov

mov

226.9 MB

References

  1. JB Andersen and P Balling. 1972. Admittance and radiation efficiency of the human body in the resonance region. Proc. IEEE , Vol. 60, 7 (1972), 900--901.Google ScholarGoogle ScholarCross RefCross Ref
  2. Tomoyuki Aono, Keisuke Higuchi, Takashi Ohira, Bokuji Komiyama, and Hideichi Sasaoka. 2005. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation , Vol. 53, 11 (2005), 3776--3784.Google ScholarGoogle ScholarCross RefCross Ref
  3. Apple. assessed at January, 2020 a. Use AirPods and other Bluetooth accessories with Apple Watch. ( assessed at January, 2020). https://support.apple.com/en-us/HT204218Google ScholarGoogle Scholar
  4. Apple. assessed at January, 2020 b. Your heart rate. What it means, and where on Apple Watch you'll find it. ( assessed at January, 2020). https://support.apple.com/en-us/HT204666Google ScholarGoogle Scholar
  5. Samprit Chatterjee and DL McLeish. 1986. Fitting linear regression models to censored data by least squares and maximum likelihood methods. Communications in Statistics-Theory and Methods , Vol. 15, 11 (1986), 3227--3243.Google ScholarGoogle ScholarCross RefCross Ref
  6. Gabe Cohn, Sidhant Gupta, Tien-Jui Lee, Dan Morris, Joshua R Smith, Matthew S Reynolds, Desney S Tan, and Shwetak N Patel. 2012a. An ultra-low-power human body motion sensor using static electric field sensing. In Proceedings of the ACM Conference on Ubiquitous Computing (UbiComp) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Gabe Cohn, Daniel Morris, Shwetak Patel, and Desney Tan. 2012b. Humantenna: using the body as an antenna for real-time whole-body interaction. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cypress. assessed at January, 2020. CYWM6935 Transceiver. ( assessed at January, 2020). https://www.cypress.com/file/123521/downloadGoogle ScholarGoogle Scholar
  9. Simon Eberz, Martin Strohmeier, Matthias Wilhelm, and Ivan Martinovic. 2012. A practical man-in-the-middle attack on signal-based key generation protocols. In Proceedings of the European Symposium on Research in Computer Security (ESCORICS) .Google ScholarGoogle ScholarCross RefCross Ref
  10. Song Fang, Ian Markwood, and Yao Liu. 2019. Wireless-Assisted Key Establishment Leveraging Channel Manipulation. IEEE Transactions on Mobile Computing (2019).Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Rainhard Dieter Findling, Muhammad Muaaz, Daniel Hintze, and René Mayrhofer. 2016. Shakeunlock: Securely transfer authentication states between mobile devices. IEEE Transactions on Mobile Computing , Vol. 16, 4 (2016), 1163--1175.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Mohamad Ghaddar, Larbi Talbi, Tayeb A Denidni, and Abderazik Sebak. 2007. A conducting cylinder for modeling human body presence in indoor propagation channel. IEEE Transactions on Antennas and Propagation , Vol. 55, 11 (2007), 3099--3103.Google ScholarGoogle ScholarCross RefCross Ref
  13. Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In Proceedings of the IEEE Symposium on Security and Privacy (S&P) .Google ScholarGoogle ScholarCross RefCross Ref
  14. Jun Han, Madhumitha Harishankar, Xiao Wang, Albert Jin Chung, and Patrick Tague. 2017. Convoy: Physical context verification for vehicle platoon admission. In Proceedings of the International Workshop on Mobile Computing Systems and Applications (HotMobile) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mehrdad Hessar, Vikram Iyer, and Shyamnath Gollakota. 2016. Enabling on-body transmissions with commodity devices. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) .Google ScholarGoogle Scholar
  16. David C Howell. 2009. Statistical methods for psychology .Cengage Learning.Google ScholarGoogle Scholar
  17. International Data Corporation (IDC). assessed at January, 2020. IDC Forecasts Steady Double-Digit Growth for Wearables as New Capabilities and Use Cases Expand the Market Opportunities. ( assessed at January, 2020). https://www.idc.com/getdoc.jsp?containerId=prUS44930019Google ScholarGoogle Scholar
  18. Apple Inc. assessed at January, 2020. Apple watch battery. ( assessed at January, 2020). https://www.apple.com/watch/battery/Google ScholarGoogle Scholar
  19. Arduino Inc. assessed at January, 2020. Arduino chips. ( assessed at January, 2020). https://www.arduino.ccGoogle ScholarGoogle Scholar
  20. Monsoon Solution Inc. assessed at January, 2020. Monsoon power monitor. ( assessed at January, 2020). https://www.msoon.com/online-store/High-Voltage-Power-Monitor-Part-Number-AAA10F-p90002590Google ScholarGoogle Scholar
  21. Texas instruments. assessed at January, 2020. CC2500 Transceiver. ( assessed at January, 2020). http://www.ti.com/product/CC2500Google ScholarGoogle Scholar
  22. Jabra. assessed at January, 2020. Jabra Elite 75t compatible with smartwatches. ( assessed at January, 2020). https://www.jabra.com/supportpages/jabra-elite-75t/100--99090000-02/faq/What-tablet-smartphone-and-smartwatch-operating-systems-are-compatible-with-Jabra-SoundPlus#/Google ScholarGoogle Scholar
  23. Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K Kasera, Neal Patwari, and Srikanth V Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Rong Jin and Kai Zeng. 2015. Physical layer key agreement under signal injection attacks. In Proceedings of the Conference on Communications and Network Security (CNS) .Google ScholarGoogle Scholar
  25. Ari Juels and Martin Wattenberg. 1999. A fuzzy commitment scheme. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-proof: usable two-factor authentication based on ambient sound. In USENIX Security Symposium (USENIX Security) .Google ScholarGoogle Scholar
  27. Behailu Kibret, Assefa K Teshome, and Daniel TH Lai. 2014. Human body as antenna and its effect on human body communications. Progress In Electromagnetics Research , Vol. 148 (2014), 193--207.Google ScholarGoogle ScholarCross RefCross Ref
  28. Behailu Kibret, Assefa K Teshome, and Daniel TH Lai. 2015. Characterizing the human body as a monopole antenna. IEEE Transactions on Antennas and Propagation , Vol. 63, 10 (2015), 4384--4392.Google ScholarGoogle ScholarCross RefCross Ref
  29. Arun Kumar, Nitesh Saxena, Gene Tsudik, and Ersin Uzun. 2009. A comparative study of secure device pairing methods. Pervasive and Mobile Computing , Vol. 5, 6 (2009), 734--749.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jingzhen Li, Zedong Nie, Yuhang Liu, Lei Wang, and Yang Hao. 2017. Evaluation of Propagation Characteristics Using the Human Body as an Antenna. Sensors , Vol. 17, 12 (2017), 2878--2893.Google ScholarGoogle ScholarCross RefCross Ref
  31. Xiaopeng Li, Fengyao Yan, Fei Zuo, Qiang Zeng, and Lannan Luo. 2019. Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In Proceedings IEEE International Conference on Computer Communications (INFOCOM) .Google ScholarGoogle ScholarCross RefCross Ref
  33. Wei Liu, Merima Kulin, Tarik Kazaz, Adnan Shahid, Ingrid Moerman, and Eli De Poorter. 2017. Wireless technology recognition based on RSSI distribution at sub-Nyquist sampling rate for constrained devices. Sensors , Vol. 17, 9 (2017), 2081--2104.Google ScholarGoogle ScholarCross RefCross Ref
  34. Yanpei Liu, Stark C Draper, and Akbar M Sayeed. 2012. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Transactions on information forensics and security , Vol. 7, 5 (2012), 1484--1497.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Youjing Lu, Fan Wu, Shaojie Tang, Linghe Kong, and Guihai Chen. 2019. FREE: A Fast and Robust Key Extraction Mechanism via Inaudible Acoustic Signal. In Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Miklós Maróti, Branislav Kusy, Gyula Simon, and Ákos Lédeczi. 2004. The flooding time synchronization protocol. In Proceedings of the International Conference on Embedded Network Sensor Systems (SenSys) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Suhas Mathur, Robert Miller, Alexander Varshavsky, Wade Trappe, and Narayan Mandayam. 2011. Proximate: proximity-based secure pairing using ambient wireless signals. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. 2008). Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Markus Miettinen, N Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and Majid Sobhani. 2014. Context-based zero-interaction pairing and key evolution for advanced personal devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Reinhold Müller and Petra Büttner. 1994. A critical discussion of intraclass correlation coefficients. Statistics in medicine , Vol. 13, 23--24 (1994), 2465--2476.Google ScholarGoogle Scholar
  41. Wolfgang KH Panofsky and Melba Phillips. 2005. Classical electricity and magnetism .Courier Corporation.Google ScholarGoogle Scholar
  42. Polar. assessed at January, 2020. Pair Heart rate sensor with your watch. ( assessed at January, 2020). https://support.polar.com/e_manuals/vantage-v/polar-vantage-v-user-manual-english/content/pairing-sensors.htmGoogle ScholarGoogle Scholar
  43. J Patrick Reilly. 2012. Applied bioelectricity: from electrical stimulation to electropathology .Springer Science & Business Media.Google ScholarGoogle Scholar
  44. Allied Market Research. assessed at January, 2020. Wearable Technology Market by Device, by Product type and Geography - Global Opportunity Analysis and Industry Forecast, 2014--2022. ( assessed at January, 2020). https://www.iedmarketresearch.com/wearable-technology-marketGoogle ScholarGoogle Scholar
  45. Marc Roeschlin, Ivan Martinovic, and Kasper Bonne Rasmussen. 2018. Device Pairing at the Touch of an Electrode.. In Proceedings of the Network and Distributed System Security Symposium (NDSS) .Google ScholarGoogle ScholarCross RefCross Ref
  46. Masoud Rostami, Ari Juels, and Farinaz Koushanfar. 2013. Heart-to-heart (H2H): authentication for implanted medical devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Dominik Schürmann and Stephan Sigg. 2011. Secure communication based on ambient audio. IEEE Transactions on Mobile Computing , Vol. 12, 2 (2011), 358--370.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard Howard, Janne Lindqvist, Predrag Spasojevic, and Jeffrey Walling. 2012. Distinguishing users with capacitive touch communication. In Proceedings of the international conference on Mobile computing and networking (Mobicom) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Qian Wang, Kaihe Xu, and Kui Ren. 2012. Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE Journal on selected areas in communications , Vol. 30, 9 (2012), 1666--1674.Google ScholarGoogle ScholarCross RefCross Ref
  50. Stephen B Wicker and Vijay K Bhargava. 1999. Reed-Solomon codes and their applications .John Wiley & Sons.Google ScholarGoogle Scholar
  51. Alan Wolke. assessed at January, 2020. Calculating RF Power from IQ Samples. ( assessed at January, 2020). https://www.tek.com/blog/calculating-rf-power-iq-samplesGoogle ScholarGoogle Scholar
  52. Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, Shaojie Tang, Jizhong Zhao, and Kun Zhao. 2014. KEEP: Fast secret key extraction protocol for D2D communication. In Proceedings of the IEEE International Symposium of Quality of Service .Google ScholarGoogle Scholar
  53. Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, and Jizhong Zhao. 2016. Instant and robust authentication and key agreement among mobile devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2017. Gait-key: A gait-based shared secret key generation protocol for wearable devices. ACM Transactions on Sensor Networks , Vol. 13, 1 (2017), 6--33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Zhenyu Yan, Yang Li, Rui Tan, and Jun Huang. 2017. Application-layer clock synchronization for wearables using skin electric potentials induced by powerline radiation. In Proceedings of the Conference on Embedded Network Sensor Systems (SenSys) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Zhenyu Yan, Qun Song, Rui Tan, Yang Li, and Adams Wai Kin Kong. 2019. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Chouchang Yang and Alanson P Sample. 2016. EM-ID: Tag-less identification of electrical devices via electromagnetic emissions. In Proceedings of the IEEE International Conference on RFID .Google ScholarGoogle ScholarCross RefCross Ref
  58. Chouchang Jack Yang and Alanson P Sample. 2017. Em-comm: Touch-based communication via modulated electromagnetic emissions. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (Ubicomp) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Lin Yang, Wei Wang, and Qian Zhang. 2016. Secret from muscle: Enabling secure pairing with electromyography. In Proceedings of the ACM Conference on Embedded Network Sensor Systems (SenSys) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Kai Zeng, Daniel Wu, An Chan, and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM) .Google ScholarGoogle ScholarCross RefCross Ref
  61. Yao Zheng, Ming Li, Wenjing Lou, and Y Thomas Hou. 2012. Sharp: Private proximity test and secure handshake with cheat-proof location tags. In Proceedings of the European Symposium on Research in Computer Security (ESCORICS) .Google ScholarGoogle ScholarCross RefCross Ref
  62. Thoams Guthrie Zimmerman. 1996. Personal area networks: near-field intrabody communication. IBM systems Journal , Vol. 35, 3.4 (1996), 609--617.Google ScholarGoogle Scholar

Index Terms

  1. Harnessing the Ambient Radio Frequency Noise for Wearable Device Pairing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
      October 2020
      2180 pages
      ISBN:9781450370899
      DOI:10.1145/3372297

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 November 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader