Home > Research > Publications & Outputs > Shake well before use: Authentication based on ...

Electronic data

View graph of relations

Shake well before use: Authentication based on Accelerometer Data

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Shake well before use: Authentication based on Accelerometer Data. / Mayrhofer, Rene; Gellersen, Hans.
Proc. Pervasive 2007: 5th International Conference on Pervasive Computing. Springer-Verlag, 2007. p. 144-161.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Mayrhofer, R & Gellersen, H 2007, Shake well before use: Authentication based on Accelerometer Data. in Proc. Pervasive 2007: 5th International Conference on Pervasive Computing. Springer-Verlag, pp. 144-161.

APA

Mayrhofer, R., & Gellersen, H. (2007). Shake well before use: Authentication based on Accelerometer Data. In Proc. Pervasive 2007: 5th International Conference on Pervasive Computing (pp. 144-161). Springer-Verlag,.

Vancouver

Mayrhofer R, Gellersen H. Shake well before use: Authentication based on Accelerometer Data. In Proc. Pervasive 2007: 5th International Conference on Pervasive Computing. Springer-Verlag,. 2007. p. 144-161

Author

Mayrhofer, Rene ; Gellersen, Hans. / Shake well before use: Authentication based on Accelerometer Data. Proc. Pervasive 2007: 5th International Conference on Pervasive Computing. Springer-Verlag, 2007. pp. 144-161

Bibtex

@inproceedings{ef7c63889558488c9a5e161e0da3cd19,
title = "Shake well before use: Authentication based on Accelerometer Data",
abstract = "Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. We introduce a new method for device-to-device authentication by shaking devices together. This paper describes two protocols for combining cryptographic authentication techniques with known methods of accelerometer data analysis to the effect of generating authenticated, secret keys. The protocols differ in their design, one being more conservative from a security point of view, while the other allows more dynamic interactions. Three experiments are used to optimize and validate our proposed authentication method.",
author = "Rene Mayrhofer and Hans Gellersen",
note = "Awarded best Pervasive 2007 paper",
year = "2007",
month = may,
language = "English",
pages = "144--161",
booktitle = "Proc. Pervasive 2007: 5th International Conference on Pervasive Computing",
publisher = "Springer-Verlag,",

}

RIS

TY - GEN

T1 - Shake well before use: Authentication based on Accelerometer Data

AU - Mayrhofer, Rene

AU - Gellersen, Hans

N1 - Awarded best Pervasive 2007 paper

PY - 2007/5

Y1 - 2007/5

N2 - Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. We introduce a new method for device-to-device authentication by shaking devices together. This paper describes two protocols for combining cryptographic authentication techniques with known methods of accelerometer data analysis to the effect of generating authenticated, secret keys. The protocols differ in their design, one being more conservative from a security point of view, while the other allows more dynamic interactions. Three experiments are used to optimize and validate our proposed authentication method.

AB - Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented by authenticating wireless communication, which is problematic when devices do not have any a priori information about each other. We introduce a new method for device-to-device authentication by shaking devices together. This paper describes two protocols for combining cryptographic authentication techniques with known methods of accelerometer data analysis to the effect of generating authenticated, secret keys. The protocols differ in their design, one being more conservative from a security point of view, while the other allows more dynamic interactions. Three experiments are used to optimize and validate our proposed authentication method.

M3 - Conference contribution/Paper

SP - 144

EP - 161

BT - Proc. Pervasive 2007: 5th International Conference on Pervasive Computing

PB - Springer-Verlag,

ER -