Resonance-based Secure Pairing for Wearables

04/27/2018
by   Wei Wang, et al.
0

Securely pairing wearables with another device is the key to many promising applications. This paper presents Touch-And-Guard (TAG), a system that uses hand touch as an intuitive manner to establish a secure connection between a wristband wearable and the touched device. It generates secret bits from hand resonant properties, which are obtained using accelerometers and vibration motors. The extracted secret bits are used by both sides to authenticate each other and then communicate confidentially. The ubiquity of accelerometers and motors presents an immediate market for our system. We demonstrate the feasibility of our system using an experimental prototype and conduct experiments involving 12 participants with 1440 trials. The results indicate that we can generate secret bits at a rate of 7.15 bit/s, which is 44 than conventional text input PIN authentication.

READ FULL TEXT

page 3

page 8

page 10

page 11

page 12

research
02/01/2022

A Novel Pair and Matching Algorithm for Embedding Secret Messages in Images

Steganography has proven to be one of the practical way of securing data...
research
01/24/2020

Increasing the Raw Key Rate in Energy-Time Entanglement Based Quantum Key Distribution

A Quantum Key Distribution (QKD) protocol describes how two remote parti...
research
07/13/2021

PakeMail: authentication and key management in decentralized secure email and messaging via PAKE

We propose the use of PAKE for achieving and enhancing entity authentica...
research
07/10/2023

ASCH-PUF: A "Zero" Bit Error Rate CMOS Physically Unclonable Function with Dual-Mode Low-Cost Stabilization

Physically unclonable functions (PUFs) are increasingly adopted for low-...
research
10/15/2020

Secret Sharing from Correlated Gaussian Random Variables and Public Communication

In this paper, we study a secret sharing problem, where a dealer distrib...
research
07/11/2023

Let's shake on it: Extracting secure shared keys from Wi-Fi CSI

A shared secret key is necessary for encrypted communications. Since Wi-...
research
09/15/2016

FPGA Implementation of a Novel Image Steganography for Hiding Images

As the complexity of current data flow systems and according infrastruct...

Please sign up or login with your details

Forgot password? Click here to reset