skip to main content
10.1145/3300061.3345434acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Public Access

Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices

Authors Info & Claims
Published:11 October 2019Publication History

ABSTRACT

Internet of Things (IoT) are densely deployed in smart environments, such as homes, factories and laboratories, where many people have physical access to IoT devices. How to authenticate users operating on these devices is thus an important problem. IoT devices usually lack conventional user interfaces, such as keyboards and mice, which makes traditional authentication methods inapplicable. We present a virtual sensing technique that allows IoT devices to virtually sense user 'petting' (in the form of some very simple touches for about 2 seconds) on the devices. Based on this technique, we build a secure and intuitive authentication method that authenticates device users by comparing the petting operations sensed by devices and those captured by the user wristband. The authentication method is highly secure as physical operations are required, rather than based on proximity. It is also intuitive, adopting very simple authentication operations, e.g., clicking buttons, twisting rotary knobs, and swiping touchscreens. Unlike the state-of-the-art methods, our method does not require any hardware modifications of devices, and thus can be applied to commercial off-the-shelf (COTS) devices. We build prototypes and evaluate them comprehensively, demonstrating their high effectiveness, security, usability, and efficiency.

References

  1. Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan capkun, Gerhard Hancke, Süleyman Karda, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, and Serge Vaudenay. 2018. Security of Distance-Bounding: A Survey. Comput. Surveys 51, 5 (2018).Google ScholarGoogle Scholar
  2. Kemal Bicakci and Bulent Tavli. 2009. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards & Interfaces 31, 5 (2009).Google ScholarGoogle Scholar
  3. John Brooke. 1996. SUS: A quick and dirty usability scale. In Usability Evaluation in Industry. Taylor & Francis, Chapter 21.Google ScholarGoogle Scholar
  4. Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security).Google ScholarGoogle Scholar
  5. Jason Cipriani. 2018. 13 new things you can do with your Android Wear smartwatch. https://www.cnet.com/how-to/tips-and-tricks-forandroid- wear-2-0/. (2018). Accessed: 2019-03-04.Google ScholarGoogle Scholar
  6. Mark D. Corner and Brian D. Noble. 2002. Zero-interaction Authentication. In Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom).Google ScholarGoogle Scholar
  7. Cas Cremers, Kasper B Rasmussen, Benedikt Schmidt, and Srdjan Capkun. 2012. Distance hijacking attacks on distance bounding protocols. In IEEE Symposium on Security and Privacy (Oakland).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Alexander De Luca, Alina Hang, Frederik Brudy, Christian Lindner, and Heinrich Hussmann. 2012. Touch me once and I know it's you!: Implicit Authentication based on Touch Screen Patterns. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Michael Esterman, Benjamin J Tamber-Rosenau, Yu-Chin Chiu, and Steven Yantis. 2010. Avoiding non-independence in fMRI data analysis: leave one subject out. Neuroimage 50, 2 (2010).Google ScholarGoogle Scholar
  10. Rong-En Fan, Pai-Hsuen Chen, and Chih-Jen Lin. 2005. Working set selection using second order information for training support vector machines. Journal of machine learning research 6, Dec (2005).Google ScholarGoogle Scholar
  11. Huan Feng, Kassem Fawaz, and Kang G. Shin. 2017. Continuous Authentication for Voice Assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (Mobi- Com).Google ScholarGoogle Scholar
  12. NFC Forum. 2018. NFC and Contactless Technologies. https://nfcforum. org/what-is-nfc/about-the-technology/. (2018).Google ScholarGoogle Scholar
  13. Lishoy Francis, Gerhard P Hancke, Keith Mayes, and Konstantinos Markantonakis. 2011. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. IACR Cryptology ePrint Archive 2011 (2011).Google ScholarGoogle Scholar
  14. Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, and Dawn Song. 2012. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication. IEEE Transactions on Information Forensics and Security 8, 1 (2012).Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Gartner. 2014. The Future Smart Home: 500 Smart Objects Will Enable NewBusiness Opportunities. https://www.gartner.com/en/documents/ 2793317. (2014). Accessed: 2019-03-02.Google ScholarGoogle Scholar
  16. Nirnimesh Ghose, Loukas Lazos, and Ming Li. 2018. SFIRE: Secret- Free-in-band Trust Establishment for COTS Wireless Devices. In IEEE International Conference on Computer Communications (INFOCOM).Google ScholarGoogle Scholar
  17. T. P. Ghuntla, H. B. Mehta, P. A. Gokhale, and C. J. Shah. 2012. A Comparative Study of Visual Reaction Time in Basketball Players and Healthy Controls. National Journal of Integrated Research in Medicine 3, 1 (2012).Google ScholarGoogle Scholar
  18. Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, and Patrick Tague. 2017. Sensetribute: Smart Home Occupant Identification via Fusion Across On-Object Sensing Devices. In Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys).Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Gerhard Hancke. 2005. A practical relay attack on ISO 14443 proximity cards. Technical Report.Google ScholarGoogle Scholar
  20. Cynthia Harvey. 2016. 75 Top IoT Devices. https://www.datamation. com/mobile-wireless/75-top-iot-devices-1.html. (2016). Accessed: 2019-02--22.Google ScholarGoogle Scholar
  21. Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In 27th USENIX Security Symposium (USENIX Security).Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Chong Hee Kim and Gildas Avoine. 2011. RFID Distance Bounding Protocols with Mixed Challenges. IEEE Transactions on Wireless Communications 10, 5 (2011).Google ScholarGoogle ScholarCross RefCross Ref
  23. Software Testing Help. 2019. 18 Most Popular IoT Devices in 2019. https://www.softwaretestinghelp.com/iot-devices/. (2019). Accessed: 2019-03--18.Google ScholarGoogle Scholar
  24. Mark R. Hodges and Martha E. Pollack. 2007. An "Object-Use Fingerprint': The Use of Electronic Sensors for Human Identification. In UbiComp 2007: Ubiquitous Computing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Tâm Huynh and Bernt Schiele. 2006. Towards Less Supervision in Activity Recognition from Wearable Sensors. In IEEE International Symposium on Wearable Computers (ISWC).Google ScholarGoogle ScholarCross RefCross Ref
  26. B. Iglewicz and D.C. Hoaglin. 1993. How to detect and handle outliers. Milwaukee, WI.: American Society for Quality (1993).Google ScholarGoogle Scholar
  27. Apple Inc. 2019. Apple Watch. https://www.apple.com/watch/. (2019). Accessed: 2019-03-04.Google ScholarGoogle Scholar
  28. Apple Inc. 2019. How to unlock your Mac with your Apple Watch. https://support.apple.com/en-us/HT206995. (2019). Accessed: 2019- 02-09.Google ScholarGoogle Scholar
  29. Motiv Inc. 2019. Motiv Ring. https://mymotiv.com/. (2019). Accessed: 2019-03--10.Google ScholarGoogle Scholar
  30. Aditya Jain, Ramta Bansal, Avnish Kumar, and K. D. Singh. 2015. A comparative study of visual and auditory reaction times on the basis of gender and physical activity levels of medical first year students. International Journal of Applied & Basic Medical Research 5, 2 (2015).Google ScholarGoogle ScholarCross RefCross Ref
  31. Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In 24th USENIX Security Symposium (USENIX Security).Google ScholarGoogle Scholar
  32. Nima Karimian, Zimu Guo, Mark Tehranipoor, and Domenic Forte. 2017. Human recognition from photoplethysmography (ppg) based on non-fiducial features. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).Google ScholarGoogle ScholarCross RefCross Ref
  33. John Krumm and Ken Hinckley. 2004. The NearMe Wireless Proximity Server. In UbiComp 2004: Ubiquitous Computing.Google ScholarGoogle Scholar
  34. Arun Kumar, Nitesh Saxena, Gene Tsudik, and Ersin Uzun. 2009. A comparative study of secure device pairing methods. Pervasive and Mobile Computing 5, 6 (2009).Google ScholarGoogle Scholar
  35. Jennifer R Kwapisz, Gary M Weiss, and Samuel A Moore. 2011. Activity Recognition using Cell Phone Accelerometers. ACM SIGKDD Explorations Newsletter 12, 2 (2011).Google ScholarGoogle Scholar
  36. Lingjun Li, Xinxin Zhao, and Guoliang Xue. 2013. Unobservable Reauthentication for Smartphones. In Proceedings of the 20th Annual Network Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  37. Xiaopeng Li, Sharaf Malebary, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, and Wenyuan Xu. 2018. iCare: Automatic and User-friendly Child Identification on Smartphones. In Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications (HotMobile).Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Xiaohui Liang, Tianlong Yun, Ronald Peterson, and David Kotz. 2017. LightTouch: Securely connecting wearables to ambient displays with user intent. In IEEE International Conference on Computer Communications (INFOCOM).Google ScholarGoogle ScholarCross RefCross Ref
  39. Feng Lin, Chen Song, Yan Zhuang, Wenyao Xu, Changzhi Li, and Kui Ren. 2017. Cardiac Scan: A Non-contact and Continuous Heart-based User Authentication System. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (MobiCom).Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Atama Designs Ltd. [n. d.]. Sesame 2. https://atama.io/. ([n. d.]). Accessed: 2019-01--31.Google ScholarGoogle Scholar
  41. Shrirang Mare, Andrés Molina Markham, Cory Cornelius, Ronald Peterson, and David Kotz. 2014. Zebra: Zero-effort bilateral recurring authentication. In IEEE Symposium on Security and Privacy (Oakland).Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Ivan Martinovic, Kasper Rasmussen, Marc Roeschlin, and Gene Tsudik. 2014. Authentication Using Pulse-Response Biometrics. In Proceedings of the 21th Annual Network Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  43. Rene Mayrhofer and Hans Gellersen. 2009. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing 8, 6 (2009).Google ScholarGoogle Scholar
  44. Daniel V. McGehee, Elizabeth N. Mazzae, and G. H. Scott Baldwin. 2000. Driver Reaction Time in Crash Avoidance Research: Validation of a Driving Simulator Study on a Test Track. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting.Google ScholarGoogle Scholar
  45. Yuxin Meng, Duncan S Wong, Roman Schlegel, et al. 2012. Touch gestures based biometric authentication scheme for touchscreen mobile phones. In International Conference on Information Security and Cryptology.Google ScholarGoogle Scholar
  46. Fabian Monrose and Aviel Rubin. 1997. Authentication via Keystroke Dynamics. In Proceedings of the 4th ACM SIGSAC Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Dibya Mukhopadhyay, Maliheh Shirvanian, and Nitesh Saxena. 2015. All your voices are belong to us: Stealing voices to fool humans and machines. In European Symposium on Research in Computer Security.Google ScholarGoogle ScholarCross RefCross Ref
  48. F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, and et al. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011).Google ScholarGoogle Scholar
  49. Konstantinos Pelechrinis, Marios Iliofotou, and Srikanth V Krishnamurthy. 2010. Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Communications Surveys & Tutorials 13, 2 (2010).Google ScholarGoogle Scholar
  50. Postscapes. 2019. IoT Devices & Products. https://www.postscapes. com/internet-of-things-award/winners/. (2019). Accessed: 2019-02--22.Google ScholarGoogle Scholar
  51. Juhi Ranjan and Kamin Whitehouse. 2015. Object Hallmarks: Identifying Object Users Using Wearable Wrist Sensors. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Nishkam Ravi, Nikhil Dandekar, Preetham Mysore, and Michael L. Littman. 2005. Activity Recognition from Accelerometer Data. In Proceedings of the 17th Conference on Innovative Applications of Artificial Intelligence.Google ScholarGoogle Scholar
  53. Kimberly Redmond, Lannan Luo, and Qiang Zeng. 2019. A crossarchitecture instruction embedding model for natural language processing-inspired binary code analysis. The NDSS Workshop on Binary Analysis Research (BAR).Google ScholarGoogle Scholar
  54. Napa Sae-Bae, Kowsar Ahmed, Katherine Isbister, and Nasir Memon. 2012. Biometric-rich gestures: a novel approach to authentication on multi-touch devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Hataichanok Saevanee and Pattarasinee Bhatarakosol. 2008. User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In International Conference on Computer and Electrical Engineering.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Sairul I Safie, John J Soraghan, and Lykourgos Petropoulakis. 2011. Electrocardiogram (ECG) biometric authentication using pulse active ratio (PAR). IEEE Transactions on Information Forensics and Security 6, 4 (2011).Google ScholarGoogle Scholar
  57. Samsung. [n. d.]. SmartThings. https://www.samsung.com/global/ galaxy/apps/smartthings/. ([n. d.]). Accessed: 2019-01--15.Google ScholarGoogle Scholar
  58. Abhijit Sarkar, A Lynn Abbott, and Zachary Doerzaph. 2016. Biometric authentication using photoplethysmography signals. In IEEE 8th International Conference on Biometrics Theory, Applications and Systems.Google ScholarGoogle ScholarCross RefCross Ref
  59. Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel. 2007. Biometric authentication using fast correlation of near infrared hand vein patterns. International Journal of Biological and Medical Sciences 2, 3 (2007).Google ScholarGoogle Scholar
  60. Sheng Shen, Mahanth Gowda, and Romit Roy Choudhury. 2018. Closing the Gaps in Inertial Motion Tracking. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (MobiCom).Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Sheng Shen, He Wang, and Romit Roy Choudhury. 2016. I Am a Smartwatch and I Can Track My User's Arm. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, and Nitesh Saxena. 2016. The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login Based on Ambient Audio. In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Santosh Singh. 2019. Top 20 IoT Platforms in 2018. https:// internetofthingswiki.com/top-20-iot-platforms/634/. (2019). Accessed: 2019-03--17.Google ScholarGoogle Scholar
  64. Zdeka Sitová, Jaroslav ednka, Qing Yang, Ge Peng, Gang Zhou, Paolo Gasti, and Kiran S Balagani. 2016. HMOG: New behavioral biometric features for continuous authentication of smartphone users. IEEE Transactions on Information Forensics and Security 11, 5 (2016).Google ScholarGoogle Scholar
  65. Michael Stanley and Jongmin Lee. 2018. Sensor Analysis for the Internet of Things. Morgan & Claypool Publishers.Google ScholarGoogle Scholar
  66. Jing Tian, Chengzhang Qu, Wenyuan Xu, and Song Wang. 2013. Kin- Write: Handwriting-Based Authentication Using Kinect. In Proceedings of the 20th Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  67. José Vila and Ricardo J. Rodríguez. 2015. Practical Experiences on NFC Relay Attacks with Android. In Radio Frequency Identification.Google ScholarGoogle Scholar
  68. Wei Wang, Lin Yang, and Qian Zhang. 2016. Touch-and-guard: secure pairing through hand resonance. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp).Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Sheng Wei, Jong Hoon Ahnn, and Miodrag Potkonjak. 2013. Energy Attacks and Defense Techniques for Wireless Systems. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Zhenyu Yan, Qun Song, Rui Tan, Yang Li, and Adams Wai Kin Kong. 2019. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. arXiv preprint arXiv:1902.07057 (2019).Google ScholarGoogle Scholar
  71. Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, XiaoFengWang, and Carl A. Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In 27th USENIX Security Symposium (USENIX Security).Google ScholarGoogle Scholar
  72. Sangki Yun, Yi-Chao Chen, and Lili Qiu. 2015. Turning a Mobile Device into a Mouse in the Air. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys).Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo, Xiaojiang Du, Chiu C. Tan, and Jie Wu. 2019. A multiversion programming inspired approach to detecting audio adversarial examples. In Proceedings of the 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).Google ScholarGoogle ScholarCross RefCross Ref
  74. Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. 2017. Dolphinattack: Inaudible voice commands. In Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Jiansong Zhang, Zeyu Wang, Zhice Yang, and Qian Zhang. 2017. Proximity Based IoT Device Authentication. In IEEE International Conference on Computer Communications (INFOCOM).Google ScholarGoogle Scholar
  76. Nan Zheng, Aaron Paloski, and HainingWang. 2011. An Efficient User Verification System via Mouse Movements. In Proceedings of the 18th ACM SIGSAC Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Pengfei Zhou, Mo Li, and Guobin Shen. 2014. Use It Free: Instantly Knowing Your Phone Attitude. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (MobiCom).Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, and Zhexin Zhang. 2019. Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs. In Proceedings of the 26th Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiCom '19: The 25th Annual International Conference on Mobile Computing and Networking
        August 2019
        1017 pages
        ISBN:9781450361699
        DOI:10.1145/3300061

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 October 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate440of2,972submissions,15%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      ePub

      View this article in ePub.

      View ePub