Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias (2019)
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2019, 3 (1)
Article, Secondary publication, Postprint
|
Text
paper-ubicomp.pdf - Accepted Version Copyright Information: In Copyright. Download (5MB) | Preview |
Item Type: | Article |
---|---|
Type of entry: | Secondary publication |
Title: | Perils of Zero-Interaction Security in the Internet of Things |
Language: | English |
Date: | 8 March 2019 |
Place of Publication: | Darmstadt |
Year of primary publication: | 2019 |
Publisher: | ACM |
Journal or Publication Title: | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) |
Volume of the journal: | 3 |
Issue Number: | 1 |
Corresponding Links: | |
Origin: | Secondary publication service |
Abstract: | The Internet of Things (IoT) demands authentication systems which can provide both security and usability. Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as zero-interaction pairing (ZIP) and zero-interaction authentication (ZIA). Prior work proposed a number of ZIP and ZIA schemes and reported promising results. However, those schemes were often evaluated under conditions which do not reflect realistic IoT scenarios. In addition, drawing any comparison among the existing schemes is impossible due to the lack of a common public dataset and unavailability of scheme implementations. In this paper, we address these challenges by conducting the first large-scale comparative study of ZIP and ZIA schemes, carried out under realistic conditions. We collect and release the most comprehensive dataset in the domain to date, containing over 4250 hours of audio recordings and 1 billion sensor readings from three different scenarios, and evaluate five state-of-the-art schemes based on these data. Our study reveals that the effectiveness of the existing proposals is highly dependent on the scenario they are used in. In particular, we show that these schemes are subject to error rates between 0.6% and 52.8%. |
Status: | Postprint |
URN: | urn:nbn:de:tuda-tuprints-85162 |
Classification DDC: | 000 Generalities, computers, information > 004 Computer science |
Divisions: | 20 Department of Computer Science > Sichere Mobile Netze DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users Zentrale Einrichtungen > University IT-Service and Computing Centre (HRZ) > Hochleistungsrechner DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1053: MAKI – Multi-Mechanisms Adaptation for the Future Internet DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1053: MAKI – Multi-Mechanisms Adaptation for the Future Internet > A: Construction Methodology > Subproject A3: Migration DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments |
Date Deposited: | 08 Mar 2019 13:47 |
Last Modified: | 06 Jun 2024 08:55 |
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/8516 |
PPN: | 446238171 |
Export: |
View Item |