skip to main content
10.1145/1814433.1814466acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Ensemble: cooperative proximity-based authentication

Published:15 June 2010Publication History

ABSTRACT

Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their personal devices with previously unknown devices by simply placing them close to each other (e.g., users can pair their phones by just bringing them into proximity). Ensemble leverages a user's growing collection of trusted devices, such as phones, music players, computers and personal sensors to observe transmissions made by pairing devices. These devices analyze variations in received signal strength (RSS) in order to determine whether the pairing devices are in physical proximity to each other. We show that, while individual trusted devices can not properly distinguish proximity in all cases, a collection of trusted devices can do so reliably. Our Ensemble prototype extends Diffie-Hellman key exchange with proximity-based authentication. Our experiments show that an Ensemble-enabled collection of Nokia N800 Internet Tablets can detect devices in close proximity and can reliably detect attackers as close as two meters away.

References

  1. Near Field communication (nfc). http://www.nfc-forum.org/resources/faqs.Google ScholarGoogle Scholar
  2. P. Bahl and V. N. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In INFOCOM: Proceedings of IEEE Conference on Computer Communications, volume 2, pages 775--784, Tel-Aviv, Isreal, March 2000.Google ScholarGoogle ScholarCross RefCross Ref
  3. D. Balfanz, D. Smetters, P. Stewart, and H. Wong. Talking to strangers: Authentication in ad-hoc wireless networks. In Proc. Network and Distributed Systems Security Symposium, San Diego, CA, 2002.Google ScholarGoogle Scholar
  4. V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 116--127, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, pages 644--654, November 1976.Google ScholarGoogle Scholar
  6. D. B. Faria and D. R. Cheriton. Detecting identity-based attacks in wireless networks using signalprints. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless security, pages 43--52, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Hazas, C. Kray, H. Gellersen, H. Agbota, G. Kortuem, and A. Krohn. A relative positioning system for co-located mobile devices. In MobiSys '05: Proceedings of the 3rd international conference on Mobile systems, applications, and services, pages 177--190, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H.-W. Gellersen. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In UbiComp '01: Proceedings of the 3rd International Conference on Ubiquitous Computing, September 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In MobiCom '09: Proceedings of the 15th ACM international conference on Mobile computing and networking, pages 321--332, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Kindberg and K. Zhang. Validating and securing spontaneous associations between wireless devices. In ISC '03: Proceedings of the 6th Information Security Conference, Bristol, UK, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  11. J. Krumm and K. Hinckley. The nearme wireless proximity server. In UbiComp '04: Proceedings of the 8th International Conference on Ubiquitous Computing, pages 283--300, Notthinham, UK, September 2004. Springer.Google ScholarGoogle ScholarCross RefCross Ref
  12. A. Ladd, K. Bekris, G. Marceau, A. Rudys, L. Kavraki, and D. Wallach. Robotics-based location sensing using wireless ethernet. In MobiCom '02: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, Atlanta, GA, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit. Place lab: Device positioning using radio beacons in the wild. In Proceedings of the Third International Conference on Pervasive Computing, Lecture Notes in Computer Science. Springer-Verlag, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 128--139, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Mayrhofer and H. Gellersen. Shake well before use: Authentication based on accelerometer data. In Proceedings of the 5th International Conference on Pervasive Computing. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. V. Otsason, A. Varshavsky, A. LaMarca, and E. de Lara. Accurate gsm indoor localization. In UbiComp '05: Proceedings of the 7th International Conference on Ubiquitous Computing, Tokyo, Japan, September, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. N. Patwari and S. K. Kasera. Robust location distinction using temporal link signatures. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 111--122, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In HotMobile '09: Proceedings of the 10th workshop on Mobile Computing Systems and Applications, February 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Y. Shaked and A. Wool. Cracking the bluetooth pin. In MobiSys '05: Proceedings of the 3rd International Conference on Mobile Systems, Applications and Services, Seattle, WA, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Smetters, D. Balfanz, G. Durfee, T. Smith, and K. Lee. Instant matchmaking: Simple, secure virtual extensions to ubiquitous computing environments. In UbiComp '06: Proceedings of the 8th International Conference on Ubiquitous Computing, Irvine, CA, September 2006.Google ScholarGoogle Scholar
  21. F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th Security Protocols Workshop, Cambridge, UK, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara. Amigo: Proximity-based authentication of mobile devices. In J. Krumm, G. D. Abowd,Google ScholarGoogle Scholar
  23. A. Seneviratne, and T. Strang, editors, Ubicomp, volume 4717 of Lecture Notes in Computer Science, pages 253--270. Springer, 2007.Google ScholarGoogle Scholar
  24. W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc '05: Proceedings of the 6th International Symposium on Mobile Ad-hoc Networking and Computing, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ensemble: cooperative proximity-based authentication

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiSys '10: Proceedings of the 8th international conference on Mobile systems, applications, and services
        June 2010
        382 pages
        ISBN:9781605589855
        DOI:10.1145/1814433

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 June 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate274of1,679submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader