Abstract
“Pairing” is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless communication channel (such as Bluetooth, WiFi). The devices are ad hoc in nature, i.e., they can neither be assumed to have a prior context (such as pre-shared secrets) with each other nor do they share a common trusted on- or off-line authority. However, the devices can generally be connected using auxiliary physical channel(s) (such as audio, visual) that can be authenticated by the device user(s), and thus form the basis for pairing.
One of the main challenges of device pairing is the lack of good quality output interfaces (e.g., a speaker, display) as well as receivers (e.g., a microphone, camera) on both devices. In this paper, we present a new pairing scheme that is universally applicable to any pair of devices, supporting all possible pairing scenarios. Our scheme does not require devices to have good transmitters or any receivers, and is based upon the device user(s) comparing short and simple synchronized audiovisual patterns, such as in the form of “beeping” and “blinking”.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Balfanz, D., Smetters, D., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Network and Distributed System Security Symposium (NDSS) (2002)
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) (2001)
Goldberg, I.: Visual Key Fingerprint Code (1996), http://www.cs.berkeley.edu/iang/visprint.c
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: International Conference on Distributed Computing Systems (ICDCS) (2006)
Laur, S., Asokan, N., Nyberg, K.: Efficient mutual data authentication based on short authenticated strings. In: IACR Cryptology ePrint Archive: Report 2005/424 (2005)
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: IEEE Symposium on Security and Privacy (S&P) (2005)
Pasini, S., Vaudenay, S.: Sas-based authenticated key agreement. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 395–409. Springer, Heidelberg (2006)
Perrig, A., Song, D.: Hash visualization: a new technique to improve real-world security. In: International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC 1999) (1999)
Roth, V., Polak, W., Rieffel, E., Turner, T.: Simple and effective defenses against evil twin access points. In: ACM Conference on Wireless Network Security (WiSec), short paper (2008)
Saxena, N., Ekberg, J.-E., Kostiainen, K., Asokan, N.: Secure device pairing based on a visual channel. In: IEEE Symposium on Security and Privacy (S&P), short paper (2006)
Soriente, C., Tsudik, G., Uzun, E.: Beda: Button-enabled device association. In: International Workshop on Security for Spontaneous Interactio (IWSSI) (2007)
Soriente, C., Tsudik, G., Uzun, E.: Hapadep: Human asisted pure audio device pairing. In: IACR Cryptology ePrint Archive: Report 2007/093 (2007)
Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)
Suomalainen, J., Valkonen, J., Asokan, N.: Security associations in personal networks: A comparative analysis. In: European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS) (2007)
Uzun, E., Karvonen, K., Asokan, N.: Usability analysis of secure pairing methods. In: Usable Security (USEC). LNCS, vol. 4886, pp. 307–324. Springer, Heidelberg (2007)
Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 309–326. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Prasad, R., Saxena, N. (2008). Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds) Applied Cryptography and Network Security. ACNS 2008. Lecture Notes in Computer Science, vol 5037. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-68914-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-68914-0_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68913-3
Online ISBN: 978-3-540-68914-0
eBook Packages: Computer ScienceComputer Science (R0)