TU Darmstadt / ULB / TUprints

Perils of Zero-Interaction Security in the Internet of Things

Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias (2019)
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 3 (1)
Article, Secondary publication

[img]
Preview
Text
paper-ubicomp.pdf - Accepted Version
Copyright Information: In Copyright.

Download (5MB) | Preview
Item Type: Article
Type of entry: Secondary publication
Title: Perils of Zero-Interaction Security in the Internet of Things
Language: English
Date: 1 March 2019
Place of Publication: Darmstadt
Publisher: ACM
Journal or Publication Title: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)
Volume of the journal: 3
Issue Number: 1
Corresponding Links:
Origin: Secondary publication service
Abstract:

The Internet of Things (IoT) demands authentication systems which can provide both security and usability. Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as zero-interaction pairing (ZIP) and zero-interaction authentication (ZIA). Prior work proposed a number of ZIP and ZIA schemes and reported promising results. However, those schemes were often evaluated under conditions which do not reflect realistic IoT scenarios. In addition, drawing any comparison among the existing schemes is impossible due to the lack of a common public dataset and unavailability of scheme implementations.

In this paper, we address these challenges by conducting the first large-scale comparative study of ZIP and ZIA schemes, carried out under realistic conditions. We collect and release the most comprehensive dataset in the domain to date, containing over 4250 hours of audio recordings and 1 billion sensor readings from three different scenarios, and evaluate five state-of-the-art schemes based on these data. Our study reveals that the effectiveness of the existing proposals is highly dependent on the scenario they are used in. In particular, we show that these schemes are subject to error rates between 0.6% and 52.8%.

URN: urn:nbn:de:tuda-tuprints-85162
Classification DDC: 000 Generalities, computers, information > 004 Computer science
Divisions: 20 Department of Computer Science > Sichere Mobile Netze
DFG-Graduiertenkollegs > Research Training Group 2050 Privacy and Trust for Mobile Users
Zentrale Einrichtungen > University IT-Service and Computing Centre (HRZ) > Hochleistungsrechner
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1053: MAKI – Multi-Mechanisms Adaptation for the Future Internet
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1053: MAKI – Multi-Mechanisms Adaptation for the Future Internet > A: Construction Methodology > Subproject A3: Migration
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Date Deposited: 08 Mar 2019 13:47
Last Modified: 13 Dec 2022 11:10
URI: https://tuprints.ulb.tu-darmstadt.de/id/eprint/8516
PPN: 446238171
Export:
Actions (login required)
View Item View Item