Perils of Zero-Interaction Security in the Internet of Things

01/22/2019
by   Mikhail Fomichev, et al.
0

The Internet of Things (IoT) demands authentication systems which can provide both security and usability. Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as zero-interaction pairing (ZIP) and zero-interaction authentication (ZIA). Prior work proposed a number of ZIP and ZIA schemes and reported promising results. However, those schemes were often evaluated under conditions which do not reflect realistic IoT scenarios. In addition, drawing any comparison among the existing schemes is impossible due to the lack of a common public dataset and unavailability of scheme implementations. In this paper, we address these challenges by conducting the first large-scale comparative study of ZIP and ZIA schemes, carried out under realistic conditions. We collect and release the most comprehensive dataset in the domain to date, containing over 4250 hours of audio recordings and 1 billion sensor readings from three different scenarios, and evaluate five state-of-the-art schemes based on these data. Our study reveals that the effectiveness of the existing proposals is highly dependent on the scenario they are used in. In particular, we show that these schemes are subject to error rates between 0.6

READ FULL TEXT
research
06/07/2023

Hardening and Speeding Up Zero-interaction Pairing and Authentication

Establishing and maintaining secure communications in the Internet of Th...
research
11/18/2019

Zero-Interaction Security – Towards Sound Experimental Validation

Reproducibility and realistic datasets are crucial for advancing researc...
research
02/08/2019

A Light-Weight Authentication Scheme for Air Force Internet of Things

Internet of Things (IoT) is ubiquitous because of its broad applications...
research
06/09/2021

FastZIP: Faster and More Secure Zero-Interaction Pairing

With the advent of the Internet of Things (IoT), establishing a secure c...
research
01/18/2022

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Existing authentication solutions proposed for Internet of Things (IoT) ...
research
11/09/2021

Next2You: Robust Copresence Detection Based on Channel State Information

Context-based copresence detection schemes are a necessary prerequisite ...

Please sign up or login with your details

Forgot password? Click here to reset