Abstract
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction opportunities in accordance with their situation. However, it is difficult to secure spontaneous interaction as this requires authentication of the encountered device, in the absence of any prior knowledge of the device. In this paper we present a method for establishing and securing spontaneous interactions on the basis of spatial references that capture the spatial relationship of the involved devices. Spatial references are obtained by accurate sensing of relative device positions, presented to the user for initiation of interactions, and used in a peer authentication protocol that exploits a novel mechanism for message transfer over ultrasound to ensures spatial authenticity of the sender.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29–37 (2004)
Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proc. 7th Int. Workshop on Security Protocols, pp. 172–194. Springer, Heidelberg (1999)
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. NDSS 2002, The Internet Society (2002)
Kindberg, T., Zhang, K., Shankar, N.: Context authentication using constrained channels. In: Proc. WMCSA 2002, pp. 14–21. IEEE Computer Society Press, Los Alamitos (2002)
Kindberg, T., Zhang, K.: Secure spontaneous devices association. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, p. 126. Springer, Heidelberg (2003)
Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 44–53. Springer, Heidelberg (2003)
McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. IEEE Symp. on Security and Privacy, pp. 110–124. IEEE Computer Society Press, Los Alamitos (2005)
Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human verifiable authentication based on audio. In: Proc. ICDCS 2006, p. 10. IEEE Computer Society Press, Los Alamitos (2006)
Clulow, J., Hancke, G.P., Kuhn, M.G., Moore, T.: So near and yet so far: Distance-bounding attacks in wireless networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 83–97. Springer, Heidelberg (2006)
Hazas, M., Kray, C., Gellersen, H., Agbota, H., Kortuem, G., Krohn, A.: A relative positioning system for co-located mobile devices. In: Proc. MobiSys 2005, pp. 177–190. ACM Press, New York (2005)
Kortuem, G., Kray, C., Gellersen, H.: Sensing and visualizing spatial relations of mobile devices. In: Proc. UIST 2005, pp. 93–102. ACM Press, New York (2005)
Guinard, D., Streng, S., Gellersen, H.: Relategateways: A user interface for spontaneous mobile interaction with pervasive services. In: CHI 2007 Workshop on Mobile Spatial Interaction (2007)
Shaked, Y., Wool, A.: Cracking the Bluetooth PIN. In: Proc. MobiSys 2005, pp. 39–50. ACM Press, New York (2005)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. on Information Theory IT-22(6), 644–654 (1976)
Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Commununications of ACM 27(4), 393–394 (1984)
Ferguson, N., Schneier, B.: Practical Cryptography. Wiley Publishing, Chichester (2003)
Eronen, P., Tschofenig, H.: RFC4279: Pre-shared key ciphersuites for transport layer security (TLS) (December 2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mayrhofer, R., Gellersen, H., Hazas, M. (2007). Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds) UbiComp 2007: Ubiquitous Computing. UbiComp 2007. Lecture Notes in Computer Science, vol 4717. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74853-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-74853-3_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74852-6
Online ISBN: 978-3-540-74853-3
eBook Packages: Computer ScienceComputer Science (R0)