Affiliation:
1. University of Wisconsin-Madison, Madison, Wisconsin, USA
2. Loyola University Chicago, Chicago, Illinois, USA
Abstract
Wireless connectivity is becoming common in increasingly diverse personal devices, enabling various interoperation- and Internet-based applications and services. More and more interconnected devices are simultaneously operated by a single user with short-lived connections, making usable device authentication methods imperative to ensure both high security and seamless user experience. Unfortunately, current authentication methods that heavily require human involvement, in addition to form factor and mobility constraints, make this balance hard to achieve, often forcing users to choose between security and convenience. In this work, we present a novel over-the-air device authentication scheme named AEROKEY that achieves both high security and high usability. With virtually no hardware overhead, AEROKEY leverages ubiquitously observable ambient electromagnetic radiation to autonomously generate spatiotemporally unique secret that can be derived only by devices that are closely located to each other. Devices can make use of this unique secret to form the basis of a symmetric key, making the authentication procedure more practical, secure and usable with no active human involvement. We propose and implement essential techniques to overcome challenges in realizing AEROKEY on low-cost microcontroller units, such as poor time synchronization, lack of precision analog front-end, and inconsistent sampling rates. Our real-world experiments demonstrate reliable authentication as well as its robustness against various realistic adversaries with low equal-error rates of 3.4% or less and usable authentication time of as low as 24 s.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction
Reference48 articles.
1. Checksum gestures
2. Donald J. Berndt and James Clifford. 1994. Using Dynamic Time Warping to Find Patterns in Time Series . In Proceedings of the International Conference on Knowledge Discovery (AAAIWS '94) . 359--370. Donald J. Berndt and James Clifford. 1994. Using Dynamic Time Warping to Find Patterns in Time Series. In Proceedings of the International Conference on Knowledge Discovery (AAAIWS '94). 359--370.
3. DOSE: Detecting user-driven operating states of electronic devices from a single sensing point
4. DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU
5. Miro Enev , Sidhant Gupta , Tadayoshi Kohno , and Shwetak N. Patel . 2011. Televisions, Video Privacy, and Powerline Electromagnetic Interference . In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11) . 537--550. https://doi.org/10.1145/ 2046 707.2046770 10.1145/2046707.2046770 Miro Enev, Sidhant Gupta, Tadayoshi Kohno, and Shwetak N. Patel. 2011. Televisions, Video Privacy, and Powerline Electromagnetic Interference. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11). 537--550. https://doi.org/10.1145/2046707.2046770
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献