Vibration-base Key Exchange among Multiple Smart Devices on the Desk

Alisa Arno, Kentaroh Toyoda, Yuji Watanabe, Iwao Sasase, P.Takis Mathiopoulos


Eavesdropping is a real concern in mobile NFC (Near Filed Communication) pay- ment and data sharing applications. Although DH (Diffie-Hellman) scheme has been widely used in key exchange for secure communica- tions, it may fail in an indoor environment due to the vulnerability against man-in-the-middle attack. In this paper, we propose a vibration- based key exchange among multiple smart de- vices on the desk. In our scheme, devices are assumed to be placed next to each other and each device vibrates with patterns converted from a key to be exchanged and measures them with accelerometer to recover it. Then, each key is recovered from measured acceleration. We implement our scheme with Android smart- phones to show the effectiveness of the pro- posed scheme.


Diffie, W., Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644–654

Gu, W., Yang, Z., Shangguan, L., Ji, X., Zhao, Y. (2014, September). ToAuth: Towards Automatic Near Field Authentication for Smartphones. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 229–236). IEEE.

Halevi, T., Ma, D., Saxena, N., Xiang, T. (2012, September). Secure proximity detection for NFC devices based on ambient sensor data. In European Symposium on Research in Computer Security (pp. 379–396). Springer Berlin Heidelberg

Halevi, T., Li, H., Ma, D., Saxena, N., Voris, J., Xiang, T. (2013). Context-aware defenses to rfid unauthorized reading and relay attacks. IEEE Transactions on Emerging Topics in Computing, 1(2), 307–318

Keogh, E.J., Pazzani, M. J. (2001, April). Derivative Dynamic Time Warping. In SIAM International Conference on Data Mining (Vol. 1, pp. 5–7)

Ma, D., Saxena, N., Xiang, T., Zhu, Y. (2013). Location-aware and safer cards: enhancing RFID security and privacy via location sensing. IEEE Transactions on Dependable and Secure Computing, 10(2), 57–69

Mathur, S., Miller, R., Varshavsky, A., Trappe, W., Mandayam, N. (2011, June). Proximate: proximitybased secure pairing using ambient wireless signals. In Proceedings of the 9th international conference on Mobile systems, applications, and services (pp. 211–224). ACM

Mayrhofer, R., Gellersen, H. (2009). Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing, 8(6), 792–806

Mehrnezhad, M., Hao, F., Shahandashti, S.F. (2014, October). Tap-Tap and Pay (TTP): Preventing ManIn-The-Middle Attacks in NFC Payment Using Mobile Sensors. In 2nd International Conference on Research in Security Standardisation (SSRŠ15)

Miettinen, M., Asokan, N., Nguyen, T.D., Sadeghi, A.R., Sobhani, M. (2014, November). Contextbased zero-interaction pairing and key evolution for advanced personal devices. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 880–891). ACM

Shrestha, B., Saxena, N., Truong, H.T.T., Asokan, N. (2014, March). Drone to the rescue: Relayresilient authentication using ambient multisensing. In International Conference on Financial Cryptography and Data Security (pp. 349–364). Springer Berlin Heidelberg

Shu, Y., Gu, Y.J., Chen, J. (2014). Dynamic authentication with sensory information for the access control systems. IEEE Transactions on Parallel and Distributed Systems, 25(2), 427–436

Smart, N.P. (2002). Identity-based authenticated key agreement protocol based on Weil pairing. Electronics letters, 38(13), 630–632

Truong, H.T.T., Gao, X., Shrestha, B., Saxena, N., Asokan, N., Nurmi, P. (2014, March). Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication. In Pervasive Computing and Communications (PerCom), 2014 IEEE International Conference on (pp. 163–171). IEEE

Urien, P., Piramuthu, S. (2013, June). Identitybased authentication to address relay attacks in temperature sensor-enabled smartcards. In Smart Objects, Systems and Technologies (SmartSysTech), Proceedings of 2013 European Conference on (pp. 1–7). VDE

Wang, T., Liu, Y., Ligatti, J. (2014, September). Fingerprinting far proximity from radio emissions. In European Symposium on Research in Computer Security (pp. 508–525). Springer International Publishing


  • There are currently no refbacks.