MagPairing: Exploiting Magnetometers for Pairing Smartphones in Close Proximity

被引:0
|
作者
Jin, Rong [1 ]
Shi, Liu [1 ]
Zeng, Kai [1 ]
Pande, Amit [2 ]
Mohapatra, Prasant [2 ]
机构
[1] Univ Michigan, Dept Comp & Informat Sci, Dearborn, MI 48128 USA
[2] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the prevalence of mobile computing, lots of wireless devices need to establish secure communication on the fly without pre-shared secrets. Device pairing is critical for bootstrapping secure communication between two previously unassociated devices over the wireless channel. Using auxiliary out-of-band channels involving visual, acoustic, tactile or vibrational sensors has been proposed as a feasible option to facilitate device pairing. However, these methods usually require users to perform additional tasks such as copying, comparing, and shaking. It is preferable to have a natural and intuitive pairing method with minimal user tasks. In this paper, we introduce a new method, called MagPairing, for pairing smartphones in close proximity by exploiting correlated magnetometer readings. In MagPairing, users only need to naturally tap the smartphones together for a few seconds without performing any additional operations in authentication and key establishment. Our method exploits the fact that smartphones are equipped with tiny magnets. Highly correlated magnetic field patterns are produced when two smartphones are close to each other. We design MagPairing protocol and implement it on Android smartphones. We conduct extensive simulation and experiments to evaluate MagPairing. Experimental results show that MagPairing can successfully pair two smartphones with 4.5 seconds on average. It is immune to man-in-the-middle attack even when the attacker is a few centimeters away from the pairing devices.
引用
收藏
页码:445 / 453
页数:9
相关论文
共 50 条
  • [1] MagPairing: Pairing Smartphones in Close Proximity Using Magnetometers
    Jin, Rong
    Shi, Liu
    Zeng, Kai
    Pande, Amit
    Mohapatra, Prasant
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1306 - 1320
  • [2] A Proximity Authentication System for Smartphones
    Li, Lingjun
    Zhao, Xinxin
    Xue, Guoliang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (06) : 605 - 616
  • [3] A method for real-time compensation of magnetometers embedded on smartphones
    Daponte, Pasquale
    De Vito, Luca
    Picariello, Francesco
    Rapuano, Sergio
    Sementa, Carmine
    2016 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE PROCEEDINGS, 2016, : 1321 - 1326
  • [4] Usability of Pairing-Based Cryptography on Smartphones
    Malina, Lukas
    Hajny, Jan
    Zeman, Vaclav
    2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 617 - 621
  • [5] Exploiting Sound Masking for Audio Privacy in Smartphones
    Tung, Yu-Chih
    Shin, Kang G.
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 257 - 268
  • [6] An improved privacy attack on smartphones exploiting the accelerometer
    De Prisco, Roberto
    De Santis, Alfredo
    Malandrino, Delfina
    Zaccagnino, Rocco
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [7] Radiated Fields in Close Proximity
    Audone, Bruno
    Colombo, Roberto
    2018 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2018, : 899 - 902
  • [8] 3 CYSTS IN CLOSE PROXIMITY
    VINCENTTOWEND, J
    ORAL SURGERY ORAL MEDICINE ORAL PATHOLOGY ORAL RADIOLOGY AND ENDODONTICS, 1976, 41 (01): : 135 - 136
  • [9] Proximity sensors: close to you
    Loughlin, Clive
    Sensor Review, 1988, 8 (04) : 198 - 202
  • [10] CLOSE PROXIMITY GUNSHOT RESIDUES
    THORNTON, JI
    JOURNAL OF FORENSIC SCIENCES, 1986, 31 (02) : 756 - 757