Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4 Hits in 1.9 sec

MagPairing: Exploiting magnetometers for pairing smartphones in close proximity

Rong Jin, Liu Shi, Kai Zeng, Amit Pande, Prasant Mohapatra
2014 2014 IEEE Conference on Communications and Network Security  
In this paper, we introduce a new method, called MagPairing, for pairing smartphones in close proximity by exploiting correlated magnetometer readings.  ...  Experimental results show that MagPairing can successfully pair two smartphones with 4.5 seconds on average.  ...  In this work, we focus on device pairing using magnetometer sensors in the smartphones and develop an intuitive scheme, called MagPairing, which pairs two smartphones when they are tapped together.  ... 
doi:10.1109/cns.2014.6997514 dblp:conf/cns/JinSZPM14 fatcat:dfztuf3xl5ddrfhrsqj5xoeybi

Key Generation for Internet of Things: A Contemporary Survey [article]

Weitao Xu, Junqing Zhang, Shunqi Huang, Chengwen Luo, Wei Li
2020 arXiv   pre-print
In the past few years, a variety of key generation protocols and systems have been proposed. In this survey, we review and categorise recent key generation systems based on a novel taxonomy.  ...  Magnetometer. Jin et al. [50, 51] proposed magnetometer-based system MagPairing to pair two smartphones in close proximity.  ...  When two smartphones are in close proximity, their magnetometer readings are highly correlated. The working flow of MagPairing is very similar to ShaVe proposed in Shake well before use [81] .  ... 
arXiv:2007.15956v2 fatcat:5uzp4sa6xfdkzpmqx3hzngpdce

A Survey of Wearable Devices Pairing Based on Biometric Signals [article]

Jafar Pourbemany, Ye Zhu, Riccardo Bettati
2021 arXiv   pre-print
Context-based pairing solutions increase the usability of wearable device pairing by eliminating any human involvement in the pairing process.  ...  A wide range of approaches has been proposed to address autonomous pairing in wearable devices.  ...  ometer Pairing smartphones in close proximity by exploiting correlated magnetometer read- ings Detecting correlated mag- netometer readings Passive attacks MITM attacks, replay attacks reflection  ... 
arXiv:2107.11685v1 fatcat:hgbpauqvzrfnpgnrfraugjtf4u

Survey and Systematization of Secure Device Pairing

Mikhail Fomichev, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick
2018 IEEE Communications Surveys and Tutorials  
In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards.  ...  Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices.  ...  ACKNOWLEDGMENT The authors would like to thank Jacqueline Brendel for her insightful discussion on the security of cryptographic protocols used in SDP.  ... 
doi:10.1109/comst.2017.2748278 fatcat:yivmyok3bzfilmkxkpfhdwnbmy