MimicGesture: Secure Device Pairing with Accelerometer-Based Gesture Input

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 214)


It is unfeasible to establish a trusted-third party in ad-hoc wireless networks. Transferring authentication data under a human user’s control and involvement, called Out-Of-Band (OOB) channel, bootstraps device pairing. A number of OOB channels have been proposed. However, none of them is generally accepted due to their lack of adaptability to various devices. In this paper, we introduce a new OOB channel, called MimicGesture, which uses accelerometer-based gesture input. We argue that our OOB channel is suitable for all kinds of mobile devices, including I/O constrained devices, as the accelerometer is small in size and requires low computational overhead. We conducted a usability test in order to check the viability of our channel.


Device pairing Mobile device Security Authentication Out-of-band channel Gesture input Accelerometer 


  1. 1.
    Canny, J.: The future of human-computer interaction. Queue-HCI 4, 6 (2006)Google Scholar
  2. 2.
    Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G., Uzun, E.: Loud and clear: Human-verifiable authentication based on audio. In: Distributed Computing Systems Conference, IEEE Press (2006)Google Scholar
  3. 3.
    Ion, I., Langheinrich, M., Kumaraguru, P., Capkun, S.: Influence of user perception, security needs, and social factors on device pairing method choices. In: Usable Privacy and Security Symposium, ACM Press (2010)Google Scholar
  4. 4.
    Kainda, R., Flechais, I., Roscoe, A.W.: Usability and security of out-of-band channels in secure device pairing protocols. In: Usable Privacy and Security Symposium, ACM Press (2009)Google Scholar
  5. 5.
    Kumar, A., Saxena, N., Tsudik, G., Usun, E.: A comparative study of secure device pairing methods. Pervas. Mobile Comput. 5, 6 (2009)Google Scholar
  6. 6.
    Liu, J., Wang, Z., Zhong, L., Wickramasuriya, J., Vasudevan, V.: uWave: Accelerometer-based gesture recognition and its applications. In: Pervasive Computing and Communications Conference, IEEE Press (2009)Google Scholar
  7. 7.
    McCune, J.M., Perrig, A.: Seeing-is-believing: Using camera phones for human-verifiable authentication. Int. J. Secur. Netw. 4, 1/2 (2009)Google Scholar
  8. 8.
    Niezen, G.: The optimization of gesture recognition techniques for resource-constrained devices. Master of Engineering Thesis, University of Pretoria, South Africa (2008)Google Scholar
  9. 9.
    Prasad, R., Saxena, N.: Efficient device pairing using “human-comparable” synchronized audiovisual patterns. In: Applied Cryptography and Network Security Conference, Springer (2008)Google Scholar
  10. 10.
    Saxena, N., Uddin, M. B.: Automated device pairing for asymmetric pairing scenarios. In: Information and Communication Security Conference, Springer (2008)Google Scholar
  11. 11.
    Soriente, C., Tsudik, G., Uzun, E.: BEDA: Button-enabled device association. In: Security for Spontaneous Interaction Workshop (2007) Google Scholar
  12. 12.
    Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: human-assisted pure audio device pairing. In: Information Security Conference, Springer (2008)Google Scholar
  13. 13.
    Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Security Protocols Workshop, Springer (1999)Google Scholar
  14. 14.
    Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: International Cryptology Conference, Springer (2005)Google Scholar
  15. 15.
    Wu, J., Pan, G., Zhang, D., Qi, G., Li, S.: Gesture recognition with a 3-D accelerometer. In: Ubiquitous Intelligence and Computing Conference, Springer (2009)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Graduate School of Systems and Information EngineeringUniversity of TsukubaTsukuba CityJapan

Personalised recommendations