2018
DOI: 10.1016/j.pmcj.2018.03.006
|View full text |Cite
|
Sign up to set email alerts
|

Moves like Jagger: Exploiting variations in instantaneous gait for spontaneous device pairing

Abstract: Seamless device pairing conditioned on the context of use fosters novel application domains and ease of use. Examples are automatic device pairings with objects interacted with, such as instrumented shopping baskets, electronic tourist guides (e.g. tablets), fitness trackers or other fitness equipment. We propose a cryptographically secure spontaneous authentication scheme, BANDANA, that exploits correlation in acceleration sequences from devices worn or carried together by the same person to extract always-fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(28 citation statements)
references
References 41 publications
0
28
0
Order By: Relevance
“…Other advanced effort study comprise control of the speed, step-length, thigh lift, hip movement and width of steps [158] (E2, C2; advanced effort), intensively training individuals over multiple days [193] (E2, C2; advanced effort) or exploiting a 100+ subject database of gait sequences [101,102] (E1, C2; advanced effort). In addition, the high accuracy of video-based gait recognition systems also empowers an adversary to generate a database of gait information on multiple subjects unnoticed [236].…”
Section: Application Usage Patternsmentioning
confidence: 99%
“…Other advanced effort study comprise control of the speed, step-length, thigh lift, hip movement and width of steps [158] (E2, C2; advanced effort), intensively training individuals over multiple days [193] (E2, C2; advanced effort) or exploiting a 100+ subject database of gait sequences [101,102] (E1, C2; advanced effort). In addition, the high accuracy of video-based gait recognition systems also empowers an adversary to generate a database of gait information on multiple subjects unnoticed [236].…”
Section: Application Usage Patternsmentioning
confidence: 99%
“…Careful choice of the parameters is therefore demanded to limit the advantage gained by an adversary through the use of fuzzy cryptography. From the protocols we investigated, BANDANA [11] and the IPI-protocol [12] employ BCH codes for error correction. [16] integrates the fuzzy vault design that operates on order-invariant tuples generated by Walkie-Talkie.…”
Section: Benefits and Pitfalls In Using Error Correctionmentioning
confidence: 99%
“…However, it relies on fuzzy cryptography which is more difficult and costly to implement. More recently, the proposal from [33] similarly uses fuzzy cryptography to extract common keys from accelerometer data. Two protocols for pairing based on accelerometer data are discussed in [25].…”
Section: A Related Workmentioning
confidence: 99%