bandana
play

BANDANA Body Area Network Device-to-device Authentication using - PowerPoint PPT Presentation

BANDANA Body Area Network Device-to-device Authentication using Natural gAit Dominik Schrmann * , Arne Brsch * , Stephan Sigg , Lars Wolf * , 2017-03-15 * Institute of Operating Systems and Computer Networks, TU Braunschweig Ambient


  1. BANDANA Body Area Network Device-to-device Authentication using Natural gAit Dominik Schürmann * , Arne Brüsch * , Stephan Sigg † , Lars Wolf * , 2017-03-15 * Institute of Operating Systems and Computer Networks, TU Braunschweig † Ambient Intelligence, Comnet, Aalto University

  2. Introduction Quantization Protocol Conclusion Waking up on Hawaii… Jet lag Awesome sunrise Let’s go jogging 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 2 of 14

  3. Introduction Quantization Protocol Conclusion Waking up on Hawaii… Quantified self 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 2 of 14

  4. Introduction Quantization Protocol Conclusion Waking up on Hawaii… Putting on your wearables 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 2 of 14

  5. Introduction Quantization Protocol Conclusion Waking up on Hawaii… Putting on all your wearables 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 2 of 14

  6. Introduction Quantization Protocol Conclusion Waking up on Hawaii… Putting on all your wearables 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 2 of 14

  7. Introduction Quantization Protocol Conclusion Device-to-Device Authentication Bluetooth Authentication “Just works” profile Still pressing buttons DH key exchange No MitM protection 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 3 of 14

  8. Introduction Quantization Protocol Conclusion Device-to-Device Authentication Bluetooth Authentication BANDANA Person’s gait (walking pattern) “Just works” profile Still pressing buttons Zero interaction DH key exchange Independent of on-body location MitM protection No MitM protection 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 3 of 14

  9. Introduction Quantization Protocol Conclusion Novelty Unlock smartphones Device2Device Authentication No init procedure with templates Muaaz et al. 2015 Fresh secrets for each D2D Hoang et al. 2015 authentication Gait Cycle 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 4 of 14

  10. Introduction Quantization Protocol Conclusion Accelerometer Reading Acceleration [m / s 2 ] 5 0 − 5 0 1 2 3 4 5 6 7 Time [s] Accelerometer reading on z-axis only 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 5 of 14

  11. Introduction Quantization Protocol Conclusion Rotated Signal Acceleration [m / s 2 ] 20 10 0 0 1 2 3 4 5 6 7 Time [s] Orientation relative to ground using Madgwick’s Algorithm z y x Notice influence of gravity g g 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 6 of 14

  12. Introduction Quantization Protocol Conclusion Noise-Reduced Signal Acceleration [m / s 2 ] 5 0 − 5 0 1 2 3 4 5 6 7 Time [s] Apply a bandpass filter to keep frequencies between 0.5 and 12 Hz 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 7 of 14

  13. Introduction Quantization Protocol Conclusion Gait-Cycle Detection Acceleration [m / s 2 ] 5 0 − 5 0 1 2 3 4 5 6 Time [s] Partition data into gait cycles Resample gait cycles to equal length Calculate average gait cycle 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 8 of 14

  14. Introduction Quantization Protocol Conclusion Quantization Acceleration [m / s 2 ] Acceleration [m / s 2 ] Acceleration [m / s 2 ] 5 5 5 0 0 0 − 5 − 5 − 5 Cycle Average Cycle 1 0 0 1 Average gait cycle overlaid on each original gait cycle 4 bits per cycle 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 9 of 14

  15. Introduction Quantization Protocol Conclusion Quantization Acceleration [m / s 2 ] 5 0 − 5 a) 1001 0100 1001 1010 1010 1001 0101 0110 b) 1001 0100 1001 1010 1010 1001 0101 0110 c) 0111 1000 1001 0101 1000 1100 1011 1000 Average gait cycle overlaid on each original gait cycle 4 bits per cycle 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 10 of 14

  16. Introduction Quantization Protocol Conclusion Comparison between Locations Acceleration [m / s 2 ] 5 0 − 5 forearm: 0111 1000 1001 0101 1000 1100 1011 1000 Acceleration [m / s 2 ] 5 0 − 5 waist: 0110 1000 1001 0001 1001 1001 1100 1010 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 11 of 14

  17. Introduction Quantization Protocol Conclusion Evaluation 1 0 . 8 Similarity 0 . 6 0 . 4 0 . 2 0 m t y t m d n h s s d a i g r e i r h o e a a i h a s h r w b h e c e t - r p a o p r f t u n Inter-body I 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 12 of 14

  18. Introduction Quantization Protocol Conclusion Authentication Request A B Sensor Recording Sensor Recording Madgwick, Bandpass Filter Madgwick, Bandpass Filter A B Gait Cycle Detection Gait Cycle Detection Quantization, Reliability ⇒ ˜ Quantization, Reliability ⇒ ˜ f A , r A f B , r B A B r r B A A B If h ( r B ) > h ( r A ) : r A = r B If h ( r A ) > h ( r B ) : r B = r A f A = Rel ( ˜ f B = Rel ( ˜ f A , r A ) f B , r B ) Fuzzy Crypto Fuzzy Crypto f A → k f B → k − − − − − − − − − − − − Password Authenticated Key Exchange (PAKE) A B s = PAKE ( k ) s = PAKE ( k ) A B 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 13 of 14

  19. Introduction Quantization Protocol Conclusion Conclusion Device-to-Device authentication for Body Area Networks Zero-interaction based on human gait pattern For 128 bit keys, 192 bit fingerprints are generated (48 cycles), disregarding 64 unreliable bits Worst-case duration: 96 s 80 % similarity required for fuzzy cryptography ⇒ 103-bit security level for the PAKE password. 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 14 of 14

  20. Introduction Quantization Protocol Conclusion Conclusion Device-to-Device authentication for Body Area Networks Zero-interaction based on human gait pattern For 128 bit keys, 192 bit fingerprints are generated (48 cycles), disregarding 64 unreliable bits Worst-case duration: 96 s 80 % similarity required for fuzzy cryptography ⇒ 103-bit security level for the PAKE password. Any questions? Dominik Schürmann <schuermann@ibr.cs.tu-bs.de> 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 14 of 14

  21. Backup Slides 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 15 of 14

  22. Spectral Coherence 1 Same subjects, different locations 0 . 8 Different subjects, same locations Different subjects, different locations 0 . 6 γ 2 0 . 4 0 . 2 0 0 5 10 15 20 25 Frequency Figure: Average spectral coherence over full sensor readings of the Mannheim dataset for same and different subject. 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 16 of 14

  23. Reliability 1 0 . 9 Similarity [%] 0 . 8 0 . 7 0 . 6 0 6 2 8 4 8 6 1 3 4 2 + 1 + + + + + N N N N N N Total Fingerprint Size M Figure: Fingerprint similarity of different sizes M with cutoff at N = 128 to evaluate the influence of Rel () . 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 17 of 14

  24. Fingerprint Similarity Table: Fingerprint similarity between locations on the same body (intra-body). Shown is the mean over all 15 subjects. upperarm forearm chest thigh head waist shin chest 1.0 0.82 0.74 0.78 0.78 0.88 0.81 forearm 0.82 1.0 0.8 0.81 0.88 0.89 0.89 head 0.74 0.8 1.0 0.8 0.76 0.77 0.78 shin 0.78 0.81 0.8 1.0 0.77 0.78 0.8 thigh 0.78 0.88 0.76 0.77 1.0 0.85 0.84 upperarm 0.88 0.89 0.77 0.78 0.85 1.0 0.88 waist 0.81 0.89 0.78 0.8 0.84 0.88 1.0 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 18 of 14

  25. Entropy 1 0 . 8 p-value 0 . 6 0 . 4 0 . 2 0 1-19 20-35 36-47 48-51 52-55 56-88 89-95 1:birthdays 5:bitsream 9:count1sstr 13:3dsphere 17:marsagliatsangcd 36-47:rgb-bitdistribution (1-12) 90:dab-bytedistrib 2:operm5 6:opso 10:count1sbyt 14:squeeze 18:sts-monobit 48-51:rgb-minimum-distance (2-5) 91:dab-dct 3:rank32x32 7:oqso 11:parkinglot 15:runs 19:sts-runs 52-55:rgb-permutations (2-5) 92-93:dab-filltree (20-21) 4:rank6x8 8:dna 12:2dsphere 16:craps 20-35:sts-serial (1-16) 56-88:rgb-lagged-sum (0-32) 94:dab-filltree (32) 89:rgb-kstest-test 95:dab-monobit2 (12) Figure: Distribution of p-values achieved for 128 bit keys (fingerprint length M = 192, 64 unreliable bits removed) in 21 runs of the various statistical tests of the dieHarder set of statistical tests. 2017-03-15 Dominik Schürmann, Arne Brüsch, Stephan Sigg, Lars Wolf BANDANA Page 19 of 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend