Skip to main content
Top
Published in: Mobile Networks and Applications 6/2021

27-05-2021

Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users

Authors: Guichuan Zhao, Qi Jiang, Xiaohan Huang, Xindi Ma, Youliang Tian, Jianfeng Ma

Published in: Mobile Networks and Applications | Issue 6/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wrist-worn smart devices are being used to share various sensitive personal information in various fields such as social, medical treatment, sports, etc. Secure pairing establishing a trusted channel between involved devices is a prerequisite to ensure data transmission security. Handshake has been employed to realize secure pairing between devices worn by different users without pre-shared knowledge, the participation of third parties or complicated user interactions. However, existing schemes cannot meet the practical requirement in terms of time delay and security. In this paper, we present a secure and usable pairing scheme utilizing the handshake acceleration data. Specifically, we propose an optimal feature selection algorithm based on Euclidean distance sorting which improves the success rate and security of the system. In addition, we use Pearson correlation coefficient based feature sequence similarity measurement approach to enhance the accuracy of pairing scheme. Theoretical and experimental security analysis indicates that our solution can resist active and passive attacks. What’s more, the experimental results demonstrate that the proposed solution has a high key generation rate of 87 bits per second, and completes security pairing in less than 4 s.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
4.
go back to reference Chen D, Zhang N, Cheng N, Zhang K, Qin Z, Shen XS (2019) Physical layer based message authentication with secure channel codes. IEEE Transactions on Dependable and Secure Computing 1–1. doi:10.1109/tdsc.2018.2846258 Chen D, Zhang N, Cheng N, Zhang K, Qin Z, Shen XS (2019) Physical layer based message authentication with secure channel codes. IEEE Transactions on Dependable and Secure Computing 1–1. doi:10.1109/tdsc.2018.2846258
6.
go back to reference Jiang Q, Ma J, Li G, Yang L (2014) Robust two-factor authentication and key agreement preserving user privacy. Intl J Netw Secur 16(3):229–240 Jiang Q, Ma J, Li G, Yang L (2014) Robust two-factor authentication and key agreement preserving user privacy. Intl J Netw Secur 16(3):229–240
7.
go back to reference Jiang Q, Zhang N, Ni J, Ma J, Ma X (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69:9390–9401CrossRef Jiang Q, Zhang N, Ni J, Ma J, Ma X (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Trans Veh Technol 69:9390–9401CrossRef
8.
go back to reference Ma X, Ma J, Li H, Jiang Q, Gao S (2017) Armor: a trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Futur Gener Comput Syst 79(1):82–94 Ma X, Ma J, Li H, Jiang Q, Gao S (2017) Armor: a trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Futur Gener Comput Syst 79(1):82–94
9.
go back to reference Schürmann D, Brüsch A, Sigg S, Wolf L (2017) BANDANA — body area network device-to-device authentication using natural gAit Schürmann D, Brüsch A, Sigg S, Wolf L (2017) BANDANA — body area network device-to-device authentication using natural gAit
10.
go back to reference Groza B, Mayrhofer R (2012) SAPHE: simple accelerometer based wireless pairing with heuristic trees. In: paper presented at the proceedings of the 10th international conference on advances in Mobile computing & multimedia, Bali, Indonesia Groza B, Mayrhofer R (2012) SAPHE: simple accelerometer based wireless pairing with heuristic trees. In: paper presented at the proceedings of the 10th international conference on advances in Mobile computing & multimedia, Bali, Indonesia
11.
go back to reference Sun Y, Wong C, Yang GZ, Lo B (2017) Secure key generation using gait features for body sensor networks. 2017 IEEE 14th international conference on wearable and implantable body sensor networks (BSN). IEEE, 2017: 206–210 Sun Y, Wong C, Yang GZ, Lo B (2017) Secure key generation using gait features for body sensor networks. 2017 IEEE 14th international conference on wearable and implantable body sensor networks (BSN). IEEE, 2017: 206–210
13.
go back to reference Holmquist LE, Mattern F, Schiele B, Alahuhta P, Beigl M, Gellersen H-W (2001) Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: paper presented at the proceedings of the 3rd international conference on ubiquitous computing, Atlanta, Georgia, USA Holmquist LE, Mattern F, Schiele B, Alahuhta P, Beigl M, Gellersen H-W (2001) Smart-its friends: a technique for users to easily establish connections between smart artefacts. In: paper presented at the proceedings of the 3rd international conference on ubiquitous computing, Atlanta, Georgia, USA
14.
go back to reference Xu W, Revadigar G, Luo C, Bergmann N, Hu W (2016) Walkie-talkie: motion-assisted automatic key generation for secure on-body device communication. In: paper presented at the proceedings of the 15th international conference on information processing in sensor networks, Vienna, Austria Xu W, Revadigar G, Luo C, Bergmann N, Hu W (2016) Walkie-talkie: motion-assisted automatic key generation for secure on-body device communication. In: paper presented at the proceedings of the 15th international conference on information processing in sensor networks, Vienna, Austria
15.
go back to reference Liu H, Wang Y, Yang J, Chen Y (2013) Fast and practical secret key extraction by exploiting channel response. In: 2013 proceedings IEEE INFOCOM Liu H, Wang Y, Yang J, Chen Y (2013) Fast and practical secret key extraction by exploiting channel response. In: 2013 proceedings IEEE INFOCOM
17.
go back to reference Schürmann D, Sigg S (2013) Secure communication based on ambient audio. IEEE T Mobile Comput 12; 12, 358-370 Schürmann D, Sigg S (2013) Secure communication based on ambient audio. IEEE T Mobile Comput 12; 12, 358-370
18.
go back to reference Qiao Y, Srinivasan K, Arora A (2014) Shape matters, not the size. Paper presented at the proceedings of the 1st ACM workshop on hot topics in wireless - HotWireless '14 Qiao Y, Srinivasan K, Arora A (2014) Shape matters, not the size. Paper presented at the proceedings of the 1st ACM workshop on hot topics in wireless - HotWireless '14
20.
go back to reference Shen Y, Yang F, Du B, Xu W, Wen H (2018) Shake-n-Shack: enabling secure data exchange between smart wearables via handshakes. In: 2018 IEEE international conference on pervasive computing and communications (PerCom) Shen Y, Yang F, Du B, Xu W, Wen H (2018) Shake-n-Shack: enabling secure data exchange between smart wearables via handshakes. In: 2018 IEEE international conference on pervasive computing and communications (PerCom)
22.
go back to reference Zhang N, Lu N, Cheng N, Mark JW (2013) Cooperative spectrum access towards secure information transfer for CRNs. IEEE J Sel Areas Commun 31(11):2453–2464CrossRef Zhang N, Lu N, Cheng N, Mark JW (2013) Cooperative spectrum access towards secure information transfer for CRNs. IEEE J Sel Areas Commun 31(11):2453–2464CrossRef
24.
go back to reference Christian G, Kaisa N (2004) Manual authentication for wireless devices. RSA Cryptobytes 7(1):29–37 Christian G, Kaisa N (2004) Manual authentication for wireless devices. RSA Cryptobytes 7(1):29–37
27.
go back to reference Findling RD, Muaaz M, Hintze D, Mayrhofer R (2014) ShakeUnlock: securely unlock Mobile devices by shaking them together. In: paper presented at the proceedings of the 12th international conference on advances in mobile computing and multimedia, Kaohsiung, Taiwan Findling RD, Muaaz M, Hintze D, Mayrhofer R (2014) ShakeUnlock: securely unlock Mobile devices by shaking them together. In: paper presented at the proceedings of the 12th international conference on advances in mobile computing and multimedia, Kaohsiung, Taiwan
28.
go back to reference Huang, X., Zhao, G., Jiang, Q., Ma, X., Tian, Y., & Ma, J. (2020). Usable and secure pairing based on handshake for wrist-worn smart devices on different users. In international conference on collaborative computing: networking, applications and Worksharing (pp. 493–510). Springer, Cham Huang, X., Zhao, G., Jiang, Q., Ma, X., Tian, Y., & Ma, J. (2020). Usable and secure pairing based on handshake for wrist-worn smart devices on different users. In international conference on collaborative computing: networking, applications and Worksharing (pp. 493–510). Springer, Cham
29.
go back to reference Juels, A., Wattenberg, M (1999) A fuzzy commitment scheme Juels, A., Wattenberg, M (1999) A fuzzy commitment scheme
31.
Metadata
Title
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users
Authors
Guichuan Zhao
Qi Jiang
Xiaohan Huang
Xindi Ma
Youliang Tian
Jianfeng Ma
Publication date
27-05-2021
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 6/2021
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-021-01781-x

Other articles of this Issue 6/2021

Mobile Networks and Applications 6/2021 Go to the issue