
Research Article
Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users
@INPROCEEDINGS{10.1007/978-3-030-67537-0_30, author={Xiaohan Huang and Guichuan Zhao and Qi Jiang and Xindi Ma and Youliang Tian and Jianfeng Ma}, title={Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users}, proceedings={Collaborative Computing: Networking, Applications and Worksharing. 16th EAI International Conference, CollaborateCom 2020, Shanghai, China, October 16--18, 2020, Proceedings, Part I}, proceedings_a={COLLABORATECOM}, year={2021}, month={1}, keywords={Handshake Secure pairing Smart wearable devices Acceleration Key negotiation}, doi={10.1007/978-3-030-67537-0_30} }
- Xiaohan Huang
Guichuan Zhao
Qi Jiang
Xindi Ma
Youliang Tian
Jianfeng Ma
Year: 2021
Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users
COLLABORATECOM
Springer
DOI: 10.1007/978-3-030-67537-0_30
Abstract
Wrist-worn smart devices are being used to share various sensitive personal information in various fields such as social, medical, sports, etc. Secure pairing establishing a trusted channel between the involved devices is a prerequisite to ensure data transmission security. Handshake has been proposed to realize secure pairing between devices worn by different users without pre-shared knowledge, the participation of third parties and complex user interactions. However, existing schemes cannot meet the practical requirement in terms of time delay and security. In this paper, we proposed a feasible handshake based secure pairing scheme, which utilizes the handshake acceleration data. Specifically, we quantify the features of acceleration data through random threshold values, to shorten the handshake time required for guaranteeing the length of the negotiated key. Besides, we propose an optimal feature selection algorithm that improves the success rate and security of the system. What’s more, security analysis indicates that our solution can resist man-in-the-middle attacks. Experiments are performed on our scheme, which show that the proposed scheme is robust and secure. Users only need to take a few seconds to perform simple operations, and the devices can automatically pair securely.