Smart Its Friends: A Technique for Users to Easily q y Establish - - PowerPoint PPT Presentation

smart its friends a technique for users to easily q y
SMART_READER_LITE
LIVE PREVIEW

Smart Its Friends: A Technique for Users to Easily q y Establish - - PowerPoint PPT Presentation

Smart Its Friends: A Technique for Users to Easily q y Establish Connections between Smart Artefacts Written by: Lars Erik Holmquist, Friedemann Mattern, Bernt Schiele, Petteri Alahuhta, Michael Beigl and Hans W. Gellersen S hi l P tt i


slide-1
SLIDE 1

Smart‐Its Friends: A Technique for Users to Easily q y Establish Connections between Smart Artefacts

Written by: Lars Erik Holmquist, Friedemann Mattern, Bernt S hi l P tt i Al h ht Mi h l B i l d H W G ll Schiele, Petteri Alahuhta, Michael Beigl and Hans‐W. Gellersen Presented by: Ueli Etter Seminar in Distributed Computing, ETHZ November 12th 2008 November 12th 2008

slide-2
SLIDE 2

Video: http://www.youtube.com/watch?v=TIVXxmxX‐eg

2

slide-3
SLIDE 3

Overview Overview

  • Part 1
  • What is the Association Problem?
  • The concept of Smart‐Its Friends

Id

  • Idea
  • Application Examples
  • Assessment
  • Part 2
  • The impact of Smart‐Its Friends

The impact of Smart Its Friends

  • iPhone application „Friend Book“
  • Alternative device association techniques

D i t d i A th ti ti

  • Device‐to‐device Authentication
  • Implicit Interaction
  • Summary

3

slide-4
SLIDE 4

Association Problem Association Problem

  • Ubiquitous Computing: smart objects linked wirelessly
  • How to associate 2 objects with each other?
  • How can you tell 2 devices that they „belong together“?

4

slide-5
SLIDE 5

Association Problem (II) Association Problem (II)

  • Examples:
  • Pairing of a mobile phone with a headset

g p

  • Data exchange between mobile users
  • Challenges:
  • Restricted User Interfaces
  • User Attention Scalability: many short‐lived interactions
  • Security

5

slide-6
SLIDE 6

Conventional Solutions Conventional Solutions

  • Enter address of target device
  • What is its address?
  • Requires input device (e g keyboard)
  • Requires input device (e.g. keyboard)
  • Tedious for user (who wants to enter dozens of addresses per day?)

6

slide-7
SLIDE 7

Conventional Solutions (II) Conventional Solutions (II)

  • Select device from a list

Select device from a list

  • Which list item corresponds to the target device?!
  • Requires output device (e.g. display)
  • Annoying for the user (especially if the list is long)

7

slide-8
SLIDE 8

Solution by Holmquist Mattern et al Solution by Holmquist, Mattern et al.

  • Shake well before use!
  • Idea: Context Proximity
  • Devices that experience same context should be connected
  • More specific: Context Proximity through Shaking

Sh k t t f t t th t i t t th

  • Shake two artefacts together to impose same context on them

8

slide-9
SLIDE 9

Smart Its Smart‐Its

  • Small‐scale embedded devices
  • Can be attached to everyday objects

(j t lik P t It t ) (just like a Post‐It note…)

  • Augment objects with

S i (T t Li ht P M t )

  • Sensing (Temperature, Light, Pressure, Movement, …)
  • Computation
  • Communication

Co u cat o

  • Prototyping platform for evaluating UbiComp

applications

9

slide-10
SLIDE 10

Smart Its Friends Smart‐Its Friends

equipped with accelerometers

  • User holds 2 Smart‐Its together and shakes them
  • Smart‐Its broadcast their shaking pattern
  • A Smart‐It receiving a shaking pattern from another Smart‐It

compares it to its own movement data If h h ki l h“ h S I

  • If the shaking patterns are „close enough“ the Smart‐Its

become friends, i.e. get connected

10

slide-11
SLIDE 11

Smart Its Friends – Application Examples Smart‐Its Friends – Application Examples

  • Establishing a communication channel
  • Pairing of a mobile phone with a headset
  • Information exchange between mobile users
  • Information exchange between mobile users
  • Telling 2 objects to keep track of each other
  • Wrist‐watch beeps whenever you leave your cell‐phone behind you

Wrist watch beeps whenever you leave your cell phone behind you

  • Credit card that only works when a „friend“ is around
  • Child monitor
  • Modifying the behaviour of a smart artefact
  • „modifier objects“ to set a parameter
  • Use a „magic stick“ with a slider to parameterise the distance a child is

allowed to be away from its parents

11

slide-12
SLIDE 12

Smart Its Friends Assessment Smart‐Its Friends ‐ Assessment

Pros

  • Intuitive

Contras

  • Not all objects can be
  • Unobtrusive
  • More than 2 objects

shaken… j

  • No input devices necessary
  • Accelerometers are
  • small
  • cheap
  • Insecure
  • power‐efficient
  • Explicit user interaction

12

slide-13
SLIDE 13

Smart Its Friends – Assessment (II) Smart‐Its Friends – Assessment (II)

D h id k i i ?

  • Does the idea work in practice?
  • Paper doesn‘t show any experimental results
  • Paper implicitly assumes that 2 devices don‘t experience the

Paper implicitly assumes that 2 devices don t experience the same shaking pattern unintentionally

  • Is this realistic?
  • What if two devices are on the same bumpy bus?
  • Will all phones be connected after the next earthquake?
  • Does it scale?
  • Does it scale?
  • n devices → n2 potential connections
  • Network/CPU overload?

/

  • Probability of false positives?

→Some way to restrict the number of potential „friends“ necessary

  • E g location
  • E.g. location

13

slide-14
SLIDE 14

iPhone Application: Friend Book [2] iPhone Application: Friend Book [2]

  • Shake 2 iPhones together to exchange contact information

Shake 2 iPhones together to exchange contact information

  • Video: http://www.youtube.com/watch?v=DFOozO0390g

14

slide-15
SLIDE 15

iPhone Application: Friend Book (II) iPhone Application: Friend Book (II)

  • Got removed from App Store after users had complained that

their contact information had been sent to random people E l ti b th d l

  • Explanation by the developers:
  • “The algorithm for matching of address cards was overly relaxed, meaning that matches

were made that should not have been made. We did not discover this issue prior to the l b bl t t t th f t ith th d ( release because we were unable to test the feature with more than a dozen users (pre‐ AppStore launch, it was impossible to let outsiders test the app). ”

  • Implementation issue or concept wrong?!

15

slide-16
SLIDE 16

SyncTap [3] SyncTap [3]

  • Why so complicated?
  • Rekimoto suggests a much

simpler protocol that doesn‘t require any sensors:

  • User presses buttons on both

devices simultaneously de ces s u ta eous y

  • Devices multicast time interval

between press and release

  • By comparing received time
  • By comparing received time

intervals with locally recorded ones connections can be established

16

slide-17
SLIDE 17

SyncTap (II) SyncTap (II)

P t l i lli i i t t d l bl

  • Protocol is collision resistant and scalable
  • If 2 or more requests arrive at the same time, the device asks the user to

press the SyncTap buttons again

  • In the 2. round the device accepts no new candidates
  • Public keys can be exchanged for making the connection secure
  • Works for any kind of devices that have at least one button

(not only for handheld devices)! (not only for handheld devices)!

17

slide-18
SLIDE 18

SyncTap (III) SyncTap (III)

18

slide-19
SLIDE 19

Device association through bumping [4] Device association through bumping [4]

  • Hinckley suggests device association by bumping devices

together

  • Example application: tablet PCs

equipped with accelerometers and touch sensors

  • Dynamic display tiling
  • Information exchange

19

slide-20
SLIDE 20

Video: http://www.acm.org/uist/archive/html/proceedings/2003.html#p149‐hinckley

20

slide-21
SLIDE 21

Generating authenticated secret keys by shaking [5] Generating authenticated secret keys by shaking [5]

  • Protocols are vulnerable to man‐in‐the‐middle attacks
  • To prevent this devices need to be authenticated

To prevent this, devices need to be authenticated

  • Many protocols for device‐to‐device authentication exist
  • Mayrhofer and Gellersen propose a protocol to generate
  • Mayrhofer and Gellersen propose a protocol to generate

authenticated shared secret keys using acceleration data

  • Shaking pattern: shared secret

Shaking pattern: shared secret

  • Protocol: Diffie‐Hellman and Interlock
  • Key agreement with Diffie‐Hellman

y g

  • Key verification using acceleration data

21

slide-22
SLIDE 22

Generating authenticated secret keys by shaking (II) Generating authenticated secret keys by shaking (II)

  • 1. Key Generation

with Diffie Hellman with Diffie‐Hellman

  • 2. Pattern exchange

with Interlock 3 L l i

  • 3. Local comparison
  • f patterns

22

  • Keys get accepted iff patternA ≈ patternB
slide-23
SLIDE 23

Generating authenticated secret keys by shaking (III) Generating authenticated secret keys by shaking (III)

l l f h k “

  • Experimental results of „hacking“ competition:
  • No false positives when accepting false negatives rate of 10.24%

23

slide-24
SLIDE 24

Video: http://www.youtube.com/watch?v=ktJC0S4_X58

24

slide-25
SLIDE 25

Implicit Interaction Implicit Interaction

  • So far: explicit interaction (shaking, bumping, button pressing)
  • Implicit Interaction: „an action, performed by the user that is

t i il i d t i t t ith t i d t not primarily aimed to interact with a computerized system but which such a system understands as input ”

  • Example:
  • Example:
  • Decrease song rating when you skip a track on your music player
  • Setting the computer to standby when you close the lid of your laptop

Sett g t e co pute to sta dby e you c ose t e d o you aptop

25

slide-26
SLIDE 26

Using Accelerometers to Determine if Two Devices are Carried by the Same Person [6]

  • Ob

ti

  • Oberservation:
  • Devices carried by the same person experience same shaking pattern
  • Idea
  • Use this to form a body network
  • Implicit Interaction
  • Existing natural action exploited: walking

g p g

  • Results so far:
  • Determine reliably if 2 devices are being carried by the same person using

8 seconds of walking data (devices have to be worn in a fanny pack) g ( y p )

  • Potential applications of a body network:
  • Borrowable cameras that can keep track of what other devices (and what

persons) they were being carried by when a picture was taken p ) y g y p

  • Automatic Synchronization of data between PDAs, laptops and wrist‐

watches

  • Automatic connection between music player and earphones

26

slide-27
SLIDE 27

Implicit access control when opening a door [7] Implicit access control when opening a door [7]

  • Explicit Interaction:
  • Swipe Identification Badge
  • Enter PIN
  • Enter PIN
  • Implicit Interaction:

Implicit Interaction:

  • Press door handle normally (existing natural action)
  • Accelerometers at your wrist and at door handle experience same

movement

  • Door can identify you
  • Door unlocks if you have access rights
  • Door unlocks if you have access rights
  • No special user actions are necessary!

27

slide-28
SLIDE 28

iBand [8] iBand [8]

  • iBand: bracelet that can store, display, and exchange information about its

user and his relationships.

  • Augments the handshake gesture
  • By shaking hands with somebody you implicitly exchange contact information
  • Combines wearable computing with social networking
  • Handshake detection:
  • Infrared Transceivers: to detect when 2 hands are in alignment

A l d h i d d d i

  • Accelerometers: to detect a synchronized up‐and‐down motion

28

slide-29
SLIDE 29

Summary

Shaken, not stirred

Summary

Sh ki h i f i i d i

not stirred…

  • Shaking: technique for associating devices
  • General Concept: Context Proximity
  • Does it work?

Does it work?

  • „Counterexample“: Friend Book
  • Other device assocation techniques
  • SyncTap
  • Bumping

D i i ti bi d ith th ti ti

  • Device association combined with secure authentication
  • Generating authenticated secret keys using sensor data
  • Real advantage of shaking technique

g g q

  • Explicit vs. Implicit Interaction
  • Explicit: shaking, bumping, pressing buttons
  • Implicit: walking, pressing a door handle, handshaking

29

slide-30
SLIDE 30

Questions? Questions?

30

slide-31
SLIDE 31

References References

1 Smart Its Friends: A technique for users to easily establish connections 1. Smart‐Its Friends: A technique for users to easily establish connections between smart artefacts (Holmquist, Mattern, Schiele, Alahuhta, Beigl, Gellersen; 2001) 2. http://tapulous.com/friendbook/ 2. http://tapulous.com/friendbook/ 3. SyncTap: synchronous user operation for spontaneous network connection (Rekimoto; 2004) 4. Synchronous Gestures for Multiple Persons and Computers (Hinckley; 2003) 5. Shake Well Before Use: Authentication Based on Accelerometer Data (Mayrhofer, Gellersen; 2007) 6 “A Y With M ?” U i A l t t D t i if T D i 6. “Are You With Me?” – Using Accelerometers to Determine if Two Devices are Carried by the Same Person (Lester, Hannaford, Borriello; 2004) 7. Grouping Mechanisms for Smart Objects Based On Implicit Interaction and Context Proximity (Antifakos Schiele Holmquist; 2003) Context Proximity (Antifakos, Schiele, Holmquist; 2003) 8. iBand: a wearable device for handshake‐augmented interpersonal information exchange (Kanis, Winters, Agamanolis, Cullinan, Gavin; 2004)

31