skip to main content
research-article

AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication

Published: 29 March 2022 Publication History
  • Get Citation Alerts
  • Abstract

    Wireless connectivity is becoming common in increasingly diverse personal devices, enabling various interoperation- and Internet-based applications and services. More and more interconnected devices are simultaneously operated by a single user with short-lived connections, making usable device authentication methods imperative to ensure both high security and seamless user experience. Unfortunately, current authentication methods that heavily require human involvement, in addition to form factor and mobility constraints, make this balance hard to achieve, often forcing users to choose between security and convenience. In this work, we present a novel over-the-air device authentication scheme named AEROKEY that achieves both high security and high usability. With virtually no hardware overhead, AEROKEY leverages ubiquitously observable ambient electromagnetic radiation to autonomously generate spatiotemporally unique secret that can be derived only by devices that are closely located to each other. Devices can make use of this unique secret to form the basis of a symmetric key, making the authentication procedure more practical, secure and usable with no active human involvement. We propose and implement essential techniques to overcome challenges in realizing AEROKEY on low-cost microcontroller units, such as poor time synchronization, lack of precision analog front-end, and inconsistent sampling rates. Our real-world experiments demonstrate reliable authentication as well as its robustness against various realistic adversaries with low equal-error rates of 3.4% or less and usable authentication time of as low as 24 s.

    Supplementary Material

    lee (lee.zip)
    Supplemental movie, appendix, image and software files for, AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication

    References

    [1]
    Imtiaj Ahmed, Yina Ye, Sourav Bhattacharya, N. Asokan, Giulio Jacucci, Petteri Nurmi, and Sasu Tarkoma. 2015. Checksum Gestures: Continuous Gestures as an out-of-Band Channel for Secure Pairing. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). 391--401. https://doi.org/10.1145/2750858.2807521
    [2]
    Lawrence E. Bassham, III, Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Elaine B. Barker, Stefan D. Leigh, Mark Levenson, Mark Vangel, David L. Banks, Nathanael Alan Heckert, James F. Dray, and San Vo. 2010. SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report.
    [3]
    Donald J. Berndt and James Clifford. 1994. Using Dynamic Time Warping to Find Patterns in Time Series. In Proceedings of the International Conference on Knowledge Discovery (AAAIWS '94). 359--370.
    [4]
    Ke-Yu Chen, Sidhant Gupta, Eric C. Larson, and Shwetak Patel. 2015. DOSE: Detecting user-driven operating states of electronic devices from a single sensing point. In 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom'15). 46--54. https://doi.org/10.1109/PERCOM.2015.7146508
    [5]
    Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, and Yi-Chao Chen. 2019. DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). 1149--1170. https://doi.org/10.1145/3319535.3339810
    [6]
    Miro Enev, Sidhant Gupta, Tadayoshi Kohno, and Shwetak N. Patel. 2011. Televisions, Video Privacy, and Powerline Electromagnetic Interference. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11). 537--550. https://doi.org/10.1145/2046707.2046770
    [7]
    Mohammed Ferdjallah and Ronald E. Barr. 1994. Adaptive Digital Notch Filter Design on the Unit Circle for the Removal of Powerline Noise from Biomedical Signals. IEEE Transactions on Biomedical Engineering 41, 6 (June 1994), 529--536. https://doi.org/10.1109/10.293240
    [8]
    Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, and Matthias Hollick. 2019. Perils of Zero-Interaction Security in the Internet of Things. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 1, Article 10 (March 2019), 38 pages. https://doi.org/10.1145/3314397
    [9]
    Carlos Garrido, Antonio F. Otero, and Jose Cidras. 2003. Low-frequency Magnetic Fields from Electrical Appliances and Power Lines. IEEE Transactions on Power Delivery 18, 4 (October 2003), 1310--1319. https://doi.org/10.1109/TPWRD.2003.817744
    [10]
    Core Specification Working Group. 2019. Bluetooth Core Specification. Rev. 5.2.
    [11]
    Bogdan Groza, Adriana Berdich, Camil Jichici, and Rene Mayrhofer. 2020. Secure Accelerometer-Based Pairing of Mobile Devices in Multi-Modal Transport. IEEE Access 8 (January 2020), 9246--9259. https://doi.org/10.1109/ACCESS.2020.2964151
    [12]
    Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types. In Proceedings of the IEEE Symposium on Security and Privacy (S&P '18). 836--852. https://doi.org/10.1109/SP.2018.00041
    [13]
    Microchip Technology Inc. 2018. SAM D5x/E5x Family Data Sheet. http://ww1.microchip.com/downloads/en/DeviceDoc/60001507C.pdf
    [14]
    Wenqiang Jin, Ming Li, Srinivasan Murali, and Linke Guo. 2020. Harnessing the Ambient Radio Frequency Noise for Wearable Device Pairing. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '20). 1135--1148. https://doi.org/10.1145/3372297.3417288
    [15]
    Nick Jones and LluÍs Masanes. 2008. Key Distillation and the Secret-Bit Fraction. IEEE Transactions on Information Theory 54, 2 (2008), 680--691. https://doi.org/10.1109/TIT.2007.913264
    [16]
    Ari Juels and Martin Wattenberg. 1999. A Fuzzy Commitment Scheme. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '99). 28--36. https://doi.org/10.1145/319709.319714
    [17]
    Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound. In Proceedings of the USENIX Security Symposium (USENIX Security '15). 483--498. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/karapanos
    [18]
    Kyuin Lee, Neil Klingensmith, Suman Banerjee, and Younghyun Kim. 2019. VoltKey: Continuous Secret Key Generation Based on Power Line Noise for Zero-Involvement Pairing and Authentication. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3, Article 93 (September 2019), 26 pages. https://doi.org/10.1145/3351251
    [19]
    Kyuin Lee, Neil Klingensmith, Dong He, Suman Banerjee, and Younghyun Kim. 2020. ivPair: Context-Based Fast Intra-Vehicle Device Pairing for Secure Wireless Connectivity. In Proceedings of the Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20). 25--30. https://doi.org/10.1145/3395351.3399436
    [20]
    Xiaopeng Li, Qiang Zeng, Lannan Luo, and Tongbo Luo. 2020. T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '20). 309--323. https://doi.org/10.1145/3372297.3417286
    [21]
    Yang Li, Rui Tan, and David K. Y. Yau. 2017. Natural Timestamping Using Powerline Electromagnetic Radiation. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN '17). 55--66. https://doi.org/10.1145/3055031.3055075
    [22]
    Qi Lin, Weitao Xu, Guohao Lan, Yesheng Cui, Hong Jia, Wen Hu, Mahbub Hassan, and Aruna Seneviratne. 2020. KEHKey: Kinetic Energy Harvester-Based Authentication and Key Generation for Body Area Network. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 1, Article 41 (March 2020), 26 pages. https://doi.org/10.1145/3381754
    [23]
    Qi Lin, Weitao Xu, Jun Liu, Abdelwahed Khamis, Wen Hu, Mahbub Hassan, and Aruna Seneviratne. 2019. H2B: Heartbeat-based Secret Key Generation Using Piezo Vibration Sensors. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN '19). 265--276. https://doi.org/10.1145/3302506.3310406
    [24]
    Mark Loveless. 2018. Understanding Bluetooth Security. https://duo.com/decipher/understanding-bluetooth-security.
    [25]
    Suhas Mathur, Robert Miller, Alexander Varshavsky, Wade Trappe, and Narayan Mandayam. 2011. ProxiMate: Proximity-based Secure Pairing Using Ambient Wireless Signals. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys '11). 211--224. https://doi.org/10.1145/1999995.2000016
    [26]
    Markus Miettinen, Nadarajah Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and Majid Sobhani. 2014. Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '14). 880--891. https://doi.org/10.1145/2660267.2660334
    [27]
    Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and N. Asokan. 2018. Revisiting Context-based Authentication in IoT. In Proceedings of the Design Automation Conference (DAC '18). Article 32, 6 pages. https://doi.org/10.1145/3195970.3196106
    [28]
    Shijia Pan, Carlos Ruiz, Jun Han, Adeola Bannis, Patrick Tague, Hae Young Noh, and Pei Zhang. 2018. UniverSense: IoT Device Pairing through Heterogeneous Sensing Signals. In Proceedings of the International Workshop on Mobile Computing Systems and Applications (HotMobile '18). 55--60. https://doi.org/10.1145/3177102.3177108
    [29]
    Shwetak N. Patel, Thomas Robertson, Julie A. Kientz, Matthew S. Reynolds, and Gregory D. Abowd. 2007. At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line. In Proceedings of the 9th International Conference on Ubiquitous Computing (UbiComp '07). 271--288. http://dl.acm.org/citation.cfm?id=1771592.1771608
    [30]
    Marc Roeschlin, Ivan Martinovic, and Kasper Rasmussen. 2018. Device Pairing at the Touch of an Electrode. In Network and Distributed Systems Security Symposium 2018 (NDSS '18). 1--15. https://doi.org/10.14722/ndss.2018.23076
    [31]
    Masoud Rostami, Ari Juels, and Farinaz Koushanfar. 2013. Heart-to-Heart (H2H): Authentication for Implanted Medical Devices. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13). 1099--1112. https://doi.org/10.1145/2508859.2516658
    [32]
    Anthony Rowe, Vikram Gupta, and Ragunathan (Raj) Rajkumar. 2009. Low-Power Clock Synchronization Using Electromagnetic Energy Radiating from AC Power Lines. In Proceedings of the ACM Conference on Embedded Networked Sensor Systems (SenSys '09). 211--224. https://doi.org/10.1145/1644038.1644060
    [33]
    Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, and N. Asokan. 2006. Secure Device Pairing Based on a Visual Channel. In Proceedings of the IEEE Symposium on Security and Privacy (S&P '06). 308--313. https://doi.org/10.1109/SP.2006.35
    [34]
    Dominik Schürmann and Stephan Sigg. 2013. Secure Communication Based on Ambient Audio. IEEE Transactions on Mobile Computing 12, 2 (February 2013), 358--370. https://doi.org/10.1109/TMC.2011.271
    [35]
    Bluetooth SIG. 2020. Bluetooth SIG Statement Regarding the Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy (BLURtooth) and the Security implications of key conversion between BR/EDR and BLE Vulnerabilities. https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/.
    [36]
    Mike Silva, Norm P. Hummon, D. Rutter, and C. Hooper. 1989. Power Frequency Magnetic Fields in the Home. IEEE Transactions on Power Delivery 4, 1 (January 1989), 465--478.
    [37]
    Artur Souza, Ivo Carlson, Heitor Ramos, Antônio Loureiro, and Leonardo Oliveira. 2020. Internet of Things device authentication via electromagnetic fingerprints. Engineering Reports 2 (07 2020). https://doi.org/10.1002/eng2.12226
    [38]
    Kaixin Sui, Mengyu Zhou, Dapeng Liu, Minghua Ma, Dan Pei, Youjian Zhao, Zimu Li, and Thomas Moscibroda. 2016. Characterizing and Improving WiFi Latency in Large-Scale Operational Networks. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys '16). 347--360. https://doi.org/10.1145/2906388.2906393
    [39]
    Bharath Sundararaman, Ugo Buy, and Ajay D. Kshemkalyani. 2005. Clock Synchronization for Wireless Sensor Networks: a Survey. Ad Hoc Networks 3, 3 (May 2005), 281--323. https://doi.org/10.1016/j.adhoc.2005.01.002
    [40]
    Santi Tofani, Piero Ossola, Giovanni d'Amore, L Anglesio, Motohisa Kanda, and David R Novotny. 1996. A Three-loop Antenna System for Performing Near-Field Measurements of Electric and Magnetic Fields from Video Display Terminals. IEEE Transactions on electromagnetic compatibility 38, 3 (1996), 341--347. https://doi.org/10.1109/15.536064
    [41]
    Ersin Uzun, Kristiina Karvonen, and N. Asokan. 2007. Usability Analysis of Secure Pairing Methods. In Financial Cryptography and Data Security. 307--324.
    [42]
    Alex Varshavsky, Adin Scannell, Anthony LaMarca, and Eyal de Lara. 2007. Amigo: Proximity-based Authentication of Mobile Devices. In Proceedings of the International Conference on Ubiquitous Computing (UbiComp '07). 253--270. https://doi.org/10.1007/978-3-540-74853-3_15
    [43]
    Jack West, Kyuin Lee, Suman Banerjee, Younghyun Kim, George K. Thiruvathukal, and Neil Klingensmith. 2021. Moonshine: An Online Randomness Distiller for Zero-Involvement Authentication. In Proceedings of the 20th International Conference on Information Processing in Sensor Networks (IPSN '21). 93--105. https://doi.org/10.1145/3412382.3458899
    [44]
    Weitao Xu, Guohao Lan, Qi Lin, Sara Khalifa, Neil Bergmann, Mahbub Hassan, and Wen Hu. 2017. KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting. In Network and Distributed Systems Security Symposium 2017 (NDSS '17). 1--15. https://doi.org/10.14722/ndss.2017.23023
    [45]
    Weitao Xu, Guohao Lan, Qi Lin, Sara Khalifa, Mahbub Hassan, Neil Bergmann, and Wen Hu. 2019. KEH-Gait: Using Kinetic Energy Harvesting for Gait-based User Authentication Systems. IEEE Transactions on Mobile Computing 18, 1 (2019), 139--152. https://doi.org/10.1109/TMC.2018.2828816
    [46]
    Weitao Xu, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2016. Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure on-Body Device Communication. In Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN '16). Article 3, 12 pages. https://doi.org/10.1109/IPSN.2016.7460726
    [47]
    Zhenyu Yan, Qun Song, Rui Tan, Yang Li, and Adams Wai Kin Kong. 2019. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials. In Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom '19). Article 23, 16 pages. https://doi.org/10.1145/3300061.3300118
    [48]
    Fangfang Yang, Mohammad A. Islam, and Shaolei Ren. 2020. PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences. In Processing of International Conference on Network and System Security (NSS '20). 354--370.
    [49]
    Lin Yang, Wei Wang, and Qian Zhang. 2016. Secret from Muscle: Enabling Secure Pairing with Electromyography. In Proceedings of the ACM Conference on Embedded Network Sensor Systems (SenSys '16). 28--41. https://doi.org/10.1145/2994551.2994556

    Cited By

    View all
    • (2024)FamilyScope: Visualizing Affective Aspects of Family Social Interactions using Passive Sensor DataProceedings of the ACM on Human-Computer Interaction10.1145/36373348:CSCW1(1-27)Online publication date: 26-Apr-2024
    • (2024)A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things2024 IEEE Workshop on Design Automation for CPS and IoT (DESTION)10.1109/DESTION62938.2024.00008(9-15)Online publication date: 13-May-2024
    • (2023)TouchKeyProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962647:2(1-21)Online publication date: 12-Jun-2023
    • Show More Cited By

    Index Terms

    1. AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
        Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 6, Issue 1
        March 2022
        1009 pages
        EISSN:2474-9567
        DOI:10.1145/3529514
        Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 29 March 2022
        Published in IMWUT Volume 6, Issue 1

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. EMR-based authentication
        2. device authentication
        3. key generation

        Qualifiers

        • Research-article
        • Research
        • Refereed

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)132
        • Downloads (Last 6 weeks)5

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)FamilyScope: Visualizing Affective Aspects of Family Social Interactions using Passive Sensor DataProceedings of the ACM on Human-Computer Interaction10.1145/36373348:CSCW1(1-27)Online publication date: 26-Apr-2024
        • (2024)A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things2024 IEEE Workshop on Design Automation for CPS and IoT (DESTION)10.1109/DESTION62938.2024.00008(9-15)Online publication date: 13-May-2024
        • (2023)TouchKeyProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962647:2(1-21)Online publication date: 12-Jun-2023
        • (2023)Fingerprinting IoT Devices Using Latent Physical Side-ChannelsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35962477:2(1-26)Online publication date: 12-Jun-2023
        • (2022)PMMSAFuture Generation Computer Systems10.1016/j.future.2022.08.002137:C(349-362)Online publication date: 1-Dec-2022

        View Options

        Get Access

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media

        -