{"id":365594,"date":"2017-02-22T06:00:11","date_gmt":"2017-02-22T14:00:11","guid":{"rendered":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/?post_type=msr-research-item&#038;p=365594"},"modified":"2018-10-16T21:30:18","modified_gmt":"2018-10-17T04:30:18","slug":"proximity-based-iot-device-authentication","status":"publish","type":"msr-research-item","link":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/proximity-based-iot-device-authentication\/","title":{"rendered":"Proximity Based IoT Device Authentication"},"content":{"rendered":"<p align=\"LEFT\">Internet of Things (IoT) devices are largely embedded<\/p>\n<p align=\"LEFT\"><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">devices which lack a sophisticated user interface, <\/span><span style=\"font-family: NimbusRomNo9L-MediItal;font-size: xx-small\">e.g.<\/span><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">, touch<\/span><\/p>\n<p align=\"LEFT\"><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">screen, keyboard, <\/span><span style=\"font-family: NimbusRomNo9L-MediItal;font-size: xx-small\">etc. <\/span><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">As a consequence, traditional Pre-Shared<\/span><\/p>\n<p align=\"LEFT\">Key (PSK) based authentication for mobile devices becomes<\/p>\n<p align=\"LEFT\">difficult to apply. For example, according to our study on home<\/p>\n<p align=\"LEFT\">automation devices which leverage smartphone for PSK input,<\/p>\n<p align=\"LEFT\">the current process does not protect against active impersonating<\/p>\n<p align=\"LEFT\"><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">attack and also leaks the Wi-Fi password to eavesdroppers, <\/span><span style=\"font-family: NimbusRomNo9L-MediItal;font-size: xx-small\">i.e.<\/span><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">,<\/span><\/p>\n<p align=\"LEFT\">currently these IoT devices can be exploited to enter into critical<\/p>\n<p align=\"LEFT\"><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">infrastructures, <\/span><span style=\"font-family: NimbusRomNo9L-MediItal;font-size: xx-small\">e.g.<\/span><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">, home networks. Motivated by this realworld<\/span><\/p>\n<p align=\"LEFT\">security vulnerability, in this paper we propose a novel<\/p>\n<p align=\"LEFT\">proximity-based mechanism for IoT device authentication, called<\/p>\n<p align=\"LEFT\"><span style=\"font-family: NimbusRomNo9L-MediItal;font-size: xx-small\">Move2Auth<\/span><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">, for the purpose of enhancing IoT device security. In<\/span><\/p>\n<p align=\"LEFT\">Move2Auth, we require user to hold smartphone and perform one<\/p>\n<p align=\"LEFT\">of two hand-gestures (moving towards and away, and rotating)<\/p>\n<p align=\"LEFT\">in front of IoT device. By combining (1) large RSS-variation and<\/p>\n<p align=\"LEFT\">(2) matching between RSS-trace and smartphone sensor-trace,<\/p>\n<p align=\"LEFT\">Move2Auth can reliably detect proximity and authenticate IoT<\/p>\n<p align=\"LEFT\">device accordingly. Based on our implementation on Samsung<\/p>\n<p align=\"LEFT\">Galaxy smartphone and commodity Wi-Fi adapter, we prove<\/p>\n<p align=\"LEFT\"><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">Move2Auth can protect against powerful active attack, <\/span><span style=\"font-family: NimbusRomNo9L-MediItal;font-size: xx-small\">i.e.<\/span><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">, the<\/span><\/p>\n<p><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">false-positive rate is consistently lower than <\/span><span style=\"font-family: CMR9;font-size: xx-small\">0<\/span><span style=\"font-family: CMMI9;font-size: xx-small\">:<\/span><span style=\"font-family: CMR9;font-size: xx-small\">5%<\/span><span style=\"font-family: NimbusRomNo9L-Medi;font-size: xx-small\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet of Things (IoT) devices are largely embedded devices which lack a sophisticated user interface, e.g., touch screen, keyboard, etc. As a consequence, traditional Pre-Shared Key (PSK) based authentication for mobile devices becomes difficult to apply. For example, according to our study on home automation devices which leverage smartphone for PSK input, the current process [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[{"type":"user_nicename","value":"jiazhang","user_id":"32277"}],"msr_publishername":"IEEE","msr_publisher_other":"","msr_booktitle":"","msr_chapter":"","msr_edition":"INFOCOM 2017","msr_editors":"","msr_how_published":"","msr_isbn":"","msr_issue":"","msr_journal":"","msr_number":"","msr_organization":"","msr_pages_string":"","msr_page_range_start":"","msr_page_range_end":"","msr_series":"","msr_volume":"","msr_copyright":"","msr_conference_name":"INFOCOM 2017","msr_doi":"","msr_arxiv_id":"","msr_s2_paper_id":"","msr_mag_id":"","msr_pubmed_id":"","msr_other_authors":"","msr_other_contributors":"","msr_speaker":"","msr_award":"","msr_affiliation":"","msr_institution":"","msr_host":"","msr_version":"","msr_duration":"","msr_original_fields_of_study":"","msr_release_tracker_id":"","msr_s2_match_type":"","msr_citation_count_updated":"","msr_published_date":"2017-05-07","msr_highlight_text":"","msr_notes":"","msr_longbiography":"","msr_publicationurl":"","msr_external_url":"","msr_secondary_video_url":"","msr_conference_url":"","msr_journal_url":"","msr_s2_pdf_url":"","msr_year":0,"msr_citation_count":0,"msr_influential_citations":0,"msr_reference_count":0,"msr_s2_match_confidence":0,"msr_microsoftintellectualproperty":true,"msr_s2_open_access":false,"msr_s2_author_ids":[],"msr_pub_ids":[],"msr_hide_image_in_river":0,"footnotes":""},"msr-research-highlight":[],"research-area":[13547],"msr-publication-type":[193716],"msr-publisher":[],"msr-focus-area":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-365594","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-systems-and-networking","msr-locale-en_us"],"msr_publishername":"IEEE","msr_edition":"INFOCOM 2017","msr_affiliation":"","msr_published_date":"2017-05-07","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"","msr_chapter":"","msr_isbn":"","msr_journal":"","msr_volume":"","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"365600","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":[{"type":"file","title":"IoTAuthenticationInfocom2017-2","viewUrl":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2017\/02\/IoTAuthenticationInfocom2017-2.pdf","id":365600,"label_id":0}],"msr_related_uploader":"","msr_citation_count":0,"msr_citation_count_updated":"","msr_s2_paper_id":"","msr_influential_citations":0,"msr_reference_count":0,"msr_arxiv_id":"","msr_s2_author_ids":[],"msr_s2_open_access":false,"msr_s2_pdf_url":null,"msr_attachments":[],"msr-author-ordering":[{"type":"user_nicename","value":"jiazhang","user_id":32277,"rest_url":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=jiazhang"}],"msr_impact_theme":[],"msr_research_lab":[199560],"msr_event":[],"msr_group":[],"msr_project":[],"publication":[],"video":[],"msr-tool":[],"msr_publication_type":"inproceedings","related_content":[],"_links":{"self":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/365594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":2,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/365594\/revisions"}],"predecessor-version":[{"id":536456,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/365594\/revisions\/536456"}],"wp:attachment":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=365594"}],"wp:term":[{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=365594"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=365594"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=365594"},{"taxonomy":"msr-publisher","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-publisher?post=365594"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=365594"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=365594"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=365594"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=365594"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=365594"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=365594"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=365594"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=365594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}