Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2047196.2047231acmconferencesArticle/Chapter ViewAbstractPublication PagesuistConference Proceedingsconference-collections
research-article

RhythmLink: securely pairing I/O-constrained devices by tapping

Published: 16 October 2011 Publication History

Abstract

We present RhythmLink, a system that improves the wireless pairing user experience. Users can link devices such as phones and headsets together by tapping a known rhythm on each device. In contrast to current solutions, RhythmLink does not require user interaction with the host device during the pairing process; and it only requires binary input on the peripheral, making it appropriate for small devices with minimal physical affordances. We describe the challenges in enabling this user experience and our solution, an algorithm that allows two devices to compare imprecisely-entered tap sequences while maintaining the secrecy of those sequences. We also discuss our prototype implementation of RhythmLink and review the results of initial user tests.

References

[1]
D Ashbrook, P Baudisch, and S White, Nenya: Subtle and eyes-free mobile input with a magnetically-tracked finger ring, Proc. CHI, 2011, pp. 2043--2046.
[2]
S Bellovin and M Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings of IEEE Symposium on Research in Security and Privacy, 1992, pp. 72--84.
[3]
Bluetooth SIG, Bluetooth core specifications, http://www.bluetooth.org, April 2011.
[4]
MK Chong, G Marsden, and H Gellersen, GesturePIN: Using discrete gestures for associating mobile devices, Proc. MobileHCI, 2010, pp. 261--264.
[5]
T Falck, H Baldus, J Espina, and K Klabunde, Plug 'n play simplicity for wireless medical body sensors, Mobile Network Applications 12 (2007), no. 2--3, 143--153.
[6]
W Henecka, S Kögl, AR Sadeghi, T Schneider, and I Wehrenberg, TASTY: tool for automating secure two-party computations, Proc. ACM Conf. on Computer and communications security, 2010, pp. 451--462.
[7]
LE Holmquist, F Mattern, B Schiele, P Alahuhta, M Beigl, and HW Gellersen, Smart-its friends: A technique for users to easily establish connections between smart artefacts, Proc. Ubicomp, 2001, pp. 116--122.
[8]
N Koblitz, Elliptic curve cryptosystems, Mathematics of Computation 48 (1987), no. 177, 203--209.
[9]
V Kolesnikov, AR Sadeghi, and T Schneider, From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design, Cryptology ePrint Archive, Report 2010/079, 2010, http://eprint.iacr.org/.
[10]
A Kumar, N Saxena, G Tsudik, and E Uzun, A comparative study of secure device pairing methods, Pervasive and Mobile Computing 5 (2009), no. 6, 734--749.
[11]
J Linsky, Simple pairing whitepaper, \small http://mclean-linsky.net/joel/cv/Simple%20Pairing_WP_V10r00.pdf, April 2011.
[12]
R Mayrhofer and H Gellersen, Spontaneous mobile device authentication based on sensor data, Information Security Technical Report 13 (2008), no. 3, 136--150.
[13]
C Metzger, M Anderson, and T Starner, Freedigiter: a contact-free device for gesture control, Proc. ISWC, 2004, pp. 18--21.
[14]
T Ni and P Baudisch, Disappearing mobile devices, Proc. UIST, 2009, pp. 101--110.
[15]
J Rekimoto, Synctap: synchronous user operation for spontaneous network connection, Personal and Ubiquitous Computing 8 (2004), no. 2, 126--134.
[16]
J Rekimoto, T Miyaki, and M Kohno, Proxnet: Secure dynamic wireless connection by proximity sensing, Proc. Pervasive, 2004, pp. 213--218.
[17]
R Roman and J Lopez, KeyLED--transmitting sensitive data over out-of-band channels in wireless sensor networks, Proc. MASS, 2008, pp. 796--801.
[18]
N Saqib, F Rodriguez-Henriquez, and A Diaz-Perez, A parallel architecture for fast computation of elliptic curve scalar multiplication over gf(2m), Proc. Parallel and Distributed Processing Symp., 2004, pp. 144--152.
[19]
C Soriente, Gene Tsudik, and E Uzun, Secure pairing of interface constrained devices, International Journal of Security and Networks 4 (2009), no. 1/2, 17--26.
[20]
A Spahić, M Kreutzer, M Kahmer, and S Chandratilleke, Pre-authentication using infrared, Proc. Workshop on Privacy, Security and Trust within the Context of Pervasive Computing, 2005, pp. 1--7.
[21]
D Sternad, WJ Dean, and K M Newell, Force and timing variability in rhythmic unimanual tapping, Journal of Motor Behavior 32 (2000), no. 3, 249--267.
[22]
E Uzun, K Karvonen, and N Asokan, Usability analysis of secure pairing methods, Financial Cryptography and Data Security, 2007, pp. 307--324.
[23]
M Weiser, The computer for the 21st century, Scientific American (2002), 94--104.
[24]
T Westeyn and T Starner, Recognizing song-based blink patterns: Applications for restricted and universal access, Proc. Automatic Face and Gesture Recog., 2004, pp. 717--722.
[25]
JO Wobbrock, Tapsongs: tapping rhythm-based passwords on a single binary sensor, Proc. UIST, 2009, pp. 93--96.

Cited By

View all
  • (2024)SoundOrbit: motion-correlation interaction with auditory orbital trajectoriesPersonal and Ubiquitous Computing10.1007/s00779-024-01818-4Online publication date: 15-Jun-2024
  • (2022)Rhythmic-Synchronization-Based Interaction: Effect of Interfering Auditory Stimuli, Age and Gender on Users’ PerformancesApplied Sciences10.3390/app1206305312:6(3053)Online publication date: 17-Mar-2022
  • (2021)HapticLock: Eyes-Free Authentication for Mobile DevicesProceedings of the 2021 International Conference on Multimodal Interaction10.1145/3462244.3481001(195-202)Online publication date: 18-Oct-2021
  • Show More Cited By

Index Terms

  1. RhythmLink: securely pairing I/O-constrained devices by tapping

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      UIST '11: Proceedings of the 24th annual ACM symposium on User interface software and technology
      October 2011
      654 pages
      ISBN:9781450307161
      DOI:10.1145/2047196
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 October 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. device pairing
      2. input
      3. mobile devices
      4. rhythm
      5. security
      6. taps

      Qualifiers

      • Research-article

      Conference

      UIST '11

      Acceptance Rates

      UIST '11 Paper Acceptance Rate 67 of 262 submissions, 26%;
      Overall Acceptance Rate 842 of 3,967 submissions, 21%

      Upcoming Conference

      UIST '24

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 06 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)SoundOrbit: motion-correlation interaction with auditory orbital trajectoriesPersonal and Ubiquitous Computing10.1007/s00779-024-01818-4Online publication date: 15-Jun-2024
      • (2022)Rhythmic-Synchronization-Based Interaction: Effect of Interfering Auditory Stimuli, Age and Gender on Users’ PerformancesApplied Sciences10.3390/app1206305312:6(3053)Online publication date: 17-Mar-2022
      • (2021)HapticLock: Eyes-Free Authentication for Mobile DevicesProceedings of the 2021 International Conference on Multimodal Interaction10.1145/3462244.3481001(195-202)Online publication date: 18-Oct-2021
      • (2020)Facilitating Temporal Synchronous Target Selection through User Behavior ModelingProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33698393:4(1-24)Online publication date: 14-Sep-2020
      • (2020)Woodpecker: Secret Back-of-Device Tap Rhythms to Authenticate Mobile Users2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC42975.2020.9283239(2727-2733)Online publication date: 11-Oct-2020
      • (2019)Dependence-aware, unbounded sound predictive race detectionProceedings of the ACM on Programming Languages10.1145/33606053:OOPSLA(1-30)Online publication date: 10-Oct-2019
      • (2019)On Chip Reconfigurable CMOS Analog Circuit Design and Automation Against Aging PhenomenaACM Transactions on Design Automation of Electronic Systems10.1145/332506924:4(1-22)Online publication date: 28-Jun-2019
      • (2018)Tap-to-PairProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/32870792:4(1-21)Online publication date: 27-Dec-2018
      • (2018)SMAPHACM Transactions on Information Systems10.1145/328410237:1(1-42)Online publication date: 6-Dec-2018
      • (2018)Beat-PINProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196543(101-115)Online publication date: 29-May-2018
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media