Proposal of Ad-Hoc Secure Device Pairing Method Using Similarity Between Marker Movement and Acceleration

  • Makoto Nagatomo
  • Kentaro Aburada
  • Hisaaki Yamaba
  • Naonobu Okazaki
  • Mirang ParkEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)


Currently, IoT devices often use wireless technologies to communicate with each other. An example is ad-hoc device pairing such as wireless distribution of meeting materials from a PC to mobile device. The problem in this case is spoofing by an impersonator. In order to solve this problem, we proposed secure device pairing method using similarity between displacement data of a marker displayed on devices and acceleration data obtained from devices. We performed experiments to confirm similarity and whether impersonator can pair with the server. As a result, we found that similarity was low and unstable. Therefore, in this paper, we propose an extended method that marker changes at an interval. These sequence of markers displayed on the device is used to recognize the device by a camera in addition to calculation of the similarity. We performed 3 experiments to confirm the similarity displacement data and examined whether an eavesdropper outside the camera range can perform pairing. Also, we performed pairing of some device together. As a result, average similarity was higher than that of previous method and pairing of three devices succeeded at rate of about 70%.


  1. 1.
    Varshavsky, A., Scannell, A., LaMarca, A., de Lara, E.: Amigo: proximity-based authentication of mobile devices. In: Proceedings of the 9th International Conference on Ubiquitous Computing (UbiComp 2007), pp. 253–270 (2007)Google Scholar
  2. 2.
    Agata, Y., Hong, J., Ohtsuki, T.: Room-level proximity detection based on RSS of dual-band Wi-Fi signals. In: Proceedings of 2016 IEEE International Conference on Communications (ICC) (2016)Google Scholar
  3. 3.
    Saxena, N., Ekberg, J.E., Kostianien, K.: Secure device pairing based on a visual channel: design and usability study. IEEE Trans. Inf. Forensics Secur. 6(1), 28–38 (2010)CrossRefGoogle Scholar
  4. 4.
    Rofouei, M., Wilson, A.D., Brush, A.J.B., Tansley, S.: Your phone or mine? Fusing body, touch and device sensing for multi-user device-display interaction. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 149–158 (2012). Camera View, Intelligent Robots and Systems, pp. 3872–3877 (2008)Google Scholar
  5. 5.
    Wilson, A.D., Benko, H.: CrossMotion: fusing device and image motion for user identification, tracking and device association. In: Proceedings of the 16th International Conference on Multimodal Interaction, pp. 216–223 (2014)Google Scholar
  6. 6.
    Maruhashi, N., Terada, T., Tsukamoto, M.: A method for identification of moving objects integrative use of a camera and accelerometers. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 1–6 (2012)Google Scholar
  7. 7.
    Osamu, S., Kagami, S., Hashimoto, K.: Identifying a moving object with an accelerometer in a camera view. In: Proceedings of the 16th International Conference on Multimodal Interaction, pp. 216–223 (2014)Google Scholar
  8. 8.
    Nagatomo, M., Aburada, K., Okazaki, N., Park, M.: Proposal and evaluation of secure device pairing method with camera and accelerometer. In: Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW), pp. 310–315 (2018)Google Scholar
  9. 9.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  10. 10.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Makoto Nagatomo
    • 1
  • Kentaro Aburada
    • 2
  • Hisaaki Yamaba
    • 2
  • Naonobu Okazaki
    • 2
  • Mirang Park
    • 1
    Email author
  1. 1.Kanagawa Institute of TechnologyAtsugiJapan
  2. 2.University of MiyazakiMiyazakiJapan

Personalised recommendations