Shake-n-Shack: Enabling Secure Data Exchange Between Smart Wearables via Handshakes

01/23/2018
by   Yiran Shen, et al.
0

Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gesture to express trust and respect, or form a mutual agreement. In this paper, we show that such physical contact can be used to bootstrap secure cyber contact between the smart devices worn by users. The key observation is that during handshaking, although belonged to two different users, the two hands involved in the shaking events are often rigidly connected, and therefore exhibit very similar motion patterns. We propose a novel Shake-n-Shack system, which harvests motion data during user handshaking from the wrist worn smart devices such as smartwatches or fitness bands, and exploits the matching motion patterns to generate symmetric keys on both parties. The generated keys can be then used to establish a secure communication channel for exchanging data between devices. This provides a much more natural and user-friendly alternative for many applications, e.g. exchanging/sharing contact details, friending on social networks, or even making payments, since it doesn't involve extra bespoke hardware, nor require the users to perform pre-defined gestures. We implement the proposed Shake-n-Shack system on off-the-shelf smartwatches, and extensive evaluation shows that it can reliably generate 128-bit symmetric keys just after around 1s of handshaking (with success rate >99 mimicking attacks: in our experiments the Equal Error Rate (EER) is only 1.6 on average. We also show that the proposed Shake-n-Shack system can be extremely lightweight, and is able to run in-situ on the resource-constrained smartwatches without incurring excessive resource consumption.

READ FULL TEXT

page 2

page 3

page 4

page 5

page 6

page 7

page 8

page 9

research
09/25/2018

Physical Layer Key Generation for Secure Power Line Communications

Leakage of information in power line communication networks is a threat ...
research
05/17/2022

Secure Summation: Capacity Region, Groupwise Key, and Feasibility

The secure summation problem is considered, where K users, each holds an...
research
10/19/2018

Immutable Autobiography of Smart Cars

The popularity of smart cars is increasing around the world as they offe...
research
07/31/2018

ABE-Cities: An Attribute-Based Encryption System for Smart Cities

In the near future, a technological revolution will involve our cities, ...
research
03/13/2023

GazePair: Efficient Pairing of Augmented Reality Devices Using Gaze Tracking

As Augmented Reality (AR) devices become more prevalent and commercially...
research
05/25/2020

Secure and User-Friendly Over-the-Air Firmware Distribution in a Portable Faraday Cage

Setting up a large-scale wireless sensor network is challenging, as firm...
research
09/24/2022

Mutual Contact Discovery

Messaging services allow new users to find existing contacts that alread...

Please sign up or login with your details

Forgot password? Click here to reset