A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
MagPairing: Exploiting magnetometers for pairing smartphones in close proximity
2014
2014 IEEE Conference on Communications and Network Security
In this paper, we introduce a new method, called MagPairing, for pairing smartphones in close proximity by exploiting correlated magnetometer readings. ...
Experimental results show that MagPairing can successfully pair two smartphones with 4.5 seconds on average. ...
In this work, we focus on device pairing using magnetometer sensors in the smartphones and develop an intuitive scheme, called MagPairing, which pairs two smartphones when they are tapped together. ...
doi:10.1109/cns.2014.6997514
dblp:conf/cns/JinSZPM14
fatcat:dfztuf3xl5ddrfhrsqj5xoeybi
Key Generation for Internet of Things: A Contemporary Survey
[article]
2020
arXiv
pre-print
In the past few years, a variety of key generation protocols and systems have been proposed. In this survey, we review and categorise recent key generation systems based on a novel taxonomy. ...
Magnetometer. Jin et al. [50, 51] proposed magnetometer-based system MagPairing to pair two smartphones in close proximity. ...
When two smartphones are in close proximity, their magnetometer readings are highly correlated. The working flow of MagPairing is very similar to ShaVe proposed in Shake well before use [81] . ...
arXiv:2007.15956v2
fatcat:5uzp4sa6xfdkzpmqx3hzngpdce
A Survey of Wearable Devices Pairing Based on Biometric Signals
[article]
2021
arXiv
pre-print
Context-based pairing solutions increase the usability of wearable device pairing by eliminating any human involvement in the pairing process. ...
A wide range of approaches has been proposed to address autonomous pairing in wearable devices. ...
ometer
Pairing smartphones in close proximity by
exploiting correlated magnetometer read-
ings
Detecting correlated mag-
netometer readings
Passive
attacks
MITM
attacks,
replay
attacks
reflection ...
arXiv:2107.11685v1
fatcat:hgbpauqvzrfnpgnrfraugjtf4u
Survey and Systematization of Secure Device Pairing
2018
IEEE Communications Surveys and Tutorials
In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. ...
Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. ...
ACKNOWLEDGMENT The authors would like to thank Jacqueline Brendel for her insightful discussion on the security of cryptographic protocols used in SDP. ...
doi:10.1109/comst.2017.2748278
fatcat:yivmyok3bzfilmkxkpfhdwnbmy