ABSTRACT
Wearable devices that capture user's rich information regarding their health conditions and daily activities have unmet pairing needs. Today's solutions, which primarily rely on human involvement, are cumbersome, error-prone, and do not scale well. Despite some prior efforts trying to fill this gap, they either rely on some sophisticated sensors, such as electromyogram (EMG) or electrocardiogram (ECG) pads that may not universally exist, or non-trivial design of communication transceivers that cannot be found easily on current commercial devices. Therefore, a pairing scheme for wearable devices that is secure, practical, and convenient is in dire need. In this paper, we propose a novel approach that leverages ambient radio frequency (RF) noise. Our design is based on a key observation that received RF noise power measured in the logarithmic scale at different parts of a human body surface experience the same variation trend, whereas those from different human bodies or off the body are distinct. Wearables make use of the observed noise as the entropy source for the proposed pairing protocol. Extensive experiments show that our scheme has an equal error rate (EER) as low as 1.4% for pairing. Its key generation rate reaches 138 bits/sec, which beats so-far existing pairing schemes. Besides, our scheme can be efficiently executed within 0.97 s. Its incurred energy consumption is as low as 0.27 J for the entire pairing procedure.
Supplemental Material
- JB Andersen and P Balling. 1972. Admittance and radiation efficiency of the human body in the resonance region. Proc. IEEE , Vol. 60, 7 (1972), 900--901.Google ScholarCross Ref
- Tomoyuki Aono, Keisuke Higuchi, Takashi Ohira, Bokuji Komiyama, and Hideichi Sasaoka. 2005. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation , Vol. 53, 11 (2005), 3776--3784.Google ScholarCross Ref
- Apple. assessed at January, 2020 a. Use AirPods and other Bluetooth accessories with Apple Watch. ( assessed at January, 2020). https://support.apple.com/en-us/HT204218Google Scholar
- Apple. assessed at January, 2020 b. Your heart rate. What it means, and where on Apple Watch you'll find it. ( assessed at January, 2020). https://support.apple.com/en-us/HT204666Google Scholar
- Samprit Chatterjee and DL McLeish. 1986. Fitting linear regression models to censored data by least squares and maximum likelihood methods. Communications in Statistics-Theory and Methods , Vol. 15, 11 (1986), 3227--3243.Google ScholarCross Ref
- Gabe Cohn, Sidhant Gupta, Tien-Jui Lee, Dan Morris, Joshua R Smith, Matthew S Reynolds, Desney S Tan, and Shwetak N Patel. 2012a. An ultra-low-power human body motion sensor using static electric field sensing. In Proceedings of the ACM Conference on Ubiquitous Computing (UbiComp) .Google ScholarDigital Library
- Gabe Cohn, Daniel Morris, Shwetak Patel, and Desney Tan. 2012b. Humantenna: using the body as an antenna for real-time whole-body interaction. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI) .Google ScholarDigital Library
- Cypress. assessed at January, 2020. CYWM6935 Transceiver. ( assessed at January, 2020). https://www.cypress.com/file/123521/downloadGoogle Scholar
- Simon Eberz, Martin Strohmeier, Matthias Wilhelm, and Ivan Martinovic. 2012. A practical man-in-the-middle attack on signal-based key generation protocols. In Proceedings of the European Symposium on Research in Computer Security (ESCORICS) .Google ScholarCross Ref
- Song Fang, Ian Markwood, and Yao Liu. 2019. Wireless-Assisted Key Establishment Leveraging Channel Manipulation. IEEE Transactions on Mobile Computing (2019).Google ScholarDigital Library
- Rainhard Dieter Findling, Muhammad Muaaz, Daniel Hintze, and René Mayrhofer. 2016. Shakeunlock: Securely transfer authentication states between mobile devices. IEEE Transactions on Mobile Computing , Vol. 16, 4 (2016), 1163--1175.Google ScholarDigital Library
- Mohamad Ghaddar, Larbi Talbi, Tayeb A Denidni, and Abderazik Sebak. 2007. A conducting cylinder for modeling human body presence in indoor propagation channel. IEEE Transactions on Antennas and Propagation , Vol. 55, 11 (2007), 3099--3103.Google ScholarCross Ref
- Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In Proceedings of the IEEE Symposium on Security and Privacy (S&P) .Google ScholarCross Ref
- Jun Han, Madhumitha Harishankar, Xiao Wang, Albert Jin Chung, and Patrick Tague. 2017. Convoy: Physical context verification for vehicle platoon admission. In Proceedings of the International Workshop on Mobile Computing Systems and Applications (HotMobile) .Google ScholarDigital Library
- Mehrdad Hessar, Vikram Iyer, and Shyamnath Gollakota. 2016. Enabling on-body transmissions with commodity devices. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) .Google Scholar
- David C Howell. 2009. Statistical methods for psychology .Cengage Learning.Google Scholar
- International Data Corporation (IDC). assessed at January, 2020. IDC Forecasts Steady Double-Digit Growth for Wearables as New Capabilities and Use Cases Expand the Market Opportunities. ( assessed at January, 2020). https://www.idc.com/getdoc.jsp?containerId=prUS44930019Google Scholar
- Apple Inc. assessed at January, 2020. Apple watch battery. ( assessed at January, 2020). https://www.apple.com/watch/battery/Google Scholar
- Arduino Inc. assessed at January, 2020. Arduino chips. ( assessed at January, 2020). https://www.arduino.ccGoogle Scholar
- Monsoon Solution Inc. assessed at January, 2020. Monsoon power monitor. ( assessed at January, 2020). https://www.msoon.com/online-store/High-Voltage-Power-Monitor-Part-Number-AAA10F-p90002590Google Scholar
- Texas instruments. assessed at January, 2020. CC2500 Transceiver. ( assessed at January, 2020). http://www.ti.com/product/CC2500Google Scholar
- Jabra. assessed at January, 2020. Jabra Elite 75t compatible with smartwatches. ( assessed at January, 2020). https://www.jabra.com/supportpages/jabra-elite-75t/100--99090000-02/faq/What-tablet-smartphone-and-smartwatch-operating-systems-are-compatible-with-Jabra-SoundPlus#/Google Scholar
- Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K Kasera, Neal Patwari, and Srikanth V Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom) .Google ScholarDigital Library
- Rong Jin and Kai Zeng. 2015. Physical layer key agreement under signal injection attacks. In Proceedings of the Conference on Communications and Network Security (CNS) .Google Scholar
- Ari Juels and Martin Wattenberg. 1999. A fuzzy commitment scheme. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) .Google ScholarDigital Library
- Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-proof: usable two-factor authentication based on ambient sound. In USENIX Security Symposium (USENIX Security) .Google Scholar
- Behailu Kibret, Assefa K Teshome, and Daniel TH Lai. 2014. Human body as antenna and its effect on human body communications. Progress In Electromagnetics Research , Vol. 148 (2014), 193--207.Google ScholarCross Ref
- Behailu Kibret, Assefa K Teshome, and Daniel TH Lai. 2015. Characterizing the human body as a monopole antenna. IEEE Transactions on Antennas and Propagation , Vol. 63, 10 (2015), 4384--4392.Google ScholarCross Ref
- Arun Kumar, Nitesh Saxena, Gene Tsudik, and Ersin Uzun. 2009. A comparative study of secure device pairing methods. Pervasive and Mobile Computing , Vol. 5, 6 (2009), 734--749.Google ScholarDigital Library
- Jingzhen Li, Zedong Nie, Yuhang Liu, Lei Wang, and Yang Hao. 2017. Evaluation of Propagation Characteristics Using the Human Body as an Antenna. Sensors , Vol. 17, 12 (2017), 2878--2893.Google ScholarCross Ref
- Xiaopeng Li, Fengyao Yan, Fei Zuo, Qiang Zeng, and Lannan Luo. 2019. Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom) .Google ScholarDigital Library
- Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In Proceedings IEEE International Conference on Computer Communications (INFOCOM) .Google ScholarCross Ref
- Wei Liu, Merima Kulin, Tarik Kazaz, Adnan Shahid, Ingrid Moerman, and Eli De Poorter. 2017. Wireless technology recognition based on RSSI distribution at sub-Nyquist sampling rate for constrained devices. Sensors , Vol. 17, 9 (2017), 2081--2104.Google ScholarCross Ref
- Yanpei Liu, Stark C Draper, and Akbar M Sayeed. 2012. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Transactions on information forensics and security , Vol. 7, 5 (2012), 1484--1497.Google ScholarDigital Library
- Youjing Lu, Fan Wu, Shaojie Tang, Linghe Kong, and Guihai Chen. 2019. FREE: A Fast and Robust Key Extraction Mechanism via Inaudible Acoustic Signal. In Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) .Google ScholarDigital Library
- Miklós Maróti, Branislav Kusy, Gyula Simon, and Ákos Lédeczi. 2004. The flooding time synchronization protocol. In Proceedings of the International Conference on Embedded Network Sensor Systems (SenSys) .Google ScholarDigital Library
- Suhas Mathur, Robert Miller, Alexander Varshavsky, Wade Trappe, and Narayan Mandayam. 2011. Proximate: proximity-based secure pairing using ambient wireless signals. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) .Google ScholarDigital Library
- Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. 2008). Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom) .Google ScholarDigital Library
- Markus Miettinen, N Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and Majid Sobhani. 2014. Context-based zero-interaction pairing and key evolution for advanced personal devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) .Google ScholarDigital Library
- Reinhold Müller and Petra Büttner. 1994. A critical discussion of intraclass correlation coefficients. Statistics in medicine , Vol. 13, 23--24 (1994), 2465--2476.Google Scholar
- Wolfgang KH Panofsky and Melba Phillips. 2005. Classical electricity and magnetism .Courier Corporation.Google Scholar
- Polar. assessed at January, 2020. Pair Heart rate sensor with your watch. ( assessed at January, 2020). https://support.polar.com/e_manuals/vantage-v/polar-vantage-v-user-manual-english/content/pairing-sensors.htmGoogle Scholar
- J Patrick Reilly. 2012. Applied bioelectricity: from electrical stimulation to electropathology .Springer Science & Business Media.Google Scholar
- Allied Market Research. assessed at January, 2020. Wearable Technology Market by Device, by Product type and Geography - Global Opportunity Analysis and Industry Forecast, 2014--2022. ( assessed at January, 2020). https://www.iedmarketresearch.com/wearable-technology-marketGoogle Scholar
- Marc Roeschlin, Ivan Martinovic, and Kasper Bonne Rasmussen. 2018. Device Pairing at the Touch of an Electrode.. In Proceedings of the Network and Distributed System Security Symposium (NDSS) .Google ScholarCross Ref
- Masoud Rostami, Ari Juels, and Farinaz Koushanfar. 2013. Heart-to-heart (H2H): authentication for implanted medical devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) .Google ScholarDigital Library
- Dominik Schürmann and Stephan Sigg. 2011. Secure communication based on ambient audio. IEEE Transactions on Mobile Computing , Vol. 12, 2 (2011), 358--370.Google ScholarDigital Library
- Tam Vu, Akash Baid, Simon Gao, Marco Gruteser, Richard Howard, Janne Lindqvist, Predrag Spasojevic, and Jeffrey Walling. 2012. Distinguishing users with capacitive touch communication. In Proceedings of the international conference on Mobile computing and networking (Mobicom) .Google ScholarDigital Library
- Qian Wang, Kaihe Xu, and Kui Ren. 2012. Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE Journal on selected areas in communications , Vol. 30, 9 (2012), 1666--1674.Google ScholarCross Ref
- Stephen B Wicker and Vijay K Bhargava. 1999. Reed-Solomon codes and their applications .John Wiley & Sons.Google Scholar
- Alan Wolke. assessed at January, 2020. Calculating RF Power from IQ Samples. ( assessed at January, 2020). https://www.tek.com/blog/calculating-rf-power-iq-samplesGoogle Scholar
- Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, Shaojie Tang, Jizhong Zhao, and Kun Zhao. 2014. KEEP: Fast secret key extraction protocol for D2D communication. In Proceedings of the IEEE International Symposium of Quality of Service .Google Scholar
- Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, and Jizhong Zhao. 2016. Instant and robust authentication and key agreement among mobile devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) .Google ScholarDigital Library
- Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2017. Gait-key: A gait-based shared secret key generation protocol for wearable devices. ACM Transactions on Sensor Networks , Vol. 13, 1 (2017), 6--33.Google ScholarDigital Library
- Zhenyu Yan, Yang Li, Rui Tan, and Jun Huang. 2017. Application-layer clock synchronization for wearables using skin electric potentials induced by powerline radiation. In Proceedings of the Conference on Embedded Network Sensor Systems (SenSys) .Google ScholarDigital Library
- Zhenyu Yan, Qun Song, Rui Tan, Yang Li, and Adams Wai Kin Kong. 2019. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom) .Google ScholarDigital Library
- Chouchang Yang and Alanson P Sample. 2016. EM-ID: Tag-less identification of electrical devices via electromagnetic emissions. In Proceedings of the IEEE International Conference on RFID .Google ScholarCross Ref
- Chouchang Jack Yang and Alanson P Sample. 2017. Em-comm: Touch-based communication via modulated electromagnetic emissions. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (Ubicomp) .Google ScholarDigital Library
- Lin Yang, Wei Wang, and Qian Zhang. 2016. Secret from muscle: Enabling secure pairing with electromyography. In Proceedings of the ACM Conference on Embedded Network Sensor Systems (SenSys) .Google ScholarDigital Library
- Kai Zeng, Daniel Wu, An Chan, and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM) .Google ScholarCross Ref
- Yao Zheng, Ming Li, Wenjing Lou, and Y Thomas Hou. 2012. Sharp: Private proximity test and secure handshake with cheat-proof location tags. In Proceedings of the European Symposium on Research in Computer Security (ESCORICS) .Google ScholarCross Ref
- Thoams Guthrie Zimmerman. 1996. Personal area networks: near-field intrabody communication. IBM systems Journal , Vol. 35, 3.4 (1996), 609--617.Google Scholar
Index Terms
- Harnessing the Ambient Radio Frequency Noise for Wearable Device Pairing
Recommendations
Certificateless Proxy Re-Encryption Without Pairing: Revisited
SCC '15: Proceedings of the 3rd International Workshop on Security in Cloud ComputingProxy Re-Encryption was introduced by Blaze, Bleumer and Strauss to efficiently solve the problem of delegation of decryption rights. In proxy re-encryption, a semi-honest proxy transforms a ciphertext intended for Alice to a ciphertext of the same ...
A short redactable signature scheme using pairing
Redactable signature schemes permit deletion of arbitrary substrings of a signed document while preserving the authenticity of the remaining document. Most of known redactable signatures based on pairing have large-sized signatures and the sizes depend ...
Comments