skip to main content
research-article

WVC: Towards Secure Device Paring for Mobile Augmented Reality

Published: 18 October 2023 Publication History

Abstract

In mobile augmented reality applications, how to build a secure device connection between two previously unassociated devices without prior set-up is challenging, which also refers to the problem of device pairing. Most existing approaches to device pairing either have certain limits to be utilized in the environment of augmented reality or lack considerations of security issues. In this article, we design WVC, an intuitive, user-friendly, and secure device paring system for mobile augmented reality. It enables users to connect to a neighboring device by waving a finger to click towards it in the air. The system uses critical features from finger tracking trajectories to understand which device a user wants to interact with. Then, it designs key generation and correction algorithms to enhance security in device communication. In addition, we present solutions to defend against malicious attacks. We implement and test the system with 10 volunteers. The experimental results demonstrate the feasibility and effectiveness of the system under varied scenarios in which devices are close to each other at a small angle or located at different heights within 2m.

References

[1]
Alicia Gong. 2021. Technology Convergence Clicks in Smartphone Cameras. Counterpoint, 2021 April 26, in press releases.
[2]
Manzoor Ahmed, Yong Li, Muhammad Waqas, Muhammad Sheraz, Depeng Jin, and Zhu Han. 2018. A survey on socially aware device-to-device communications. IEEE Communications Surveys & Tutorials 20, 3 (2018), 2169–2197.
[3]
Dajiang Chen, Ning Zhang, Zhen Qin, Xufei Mao, Zhiguang Qin, Xuemin Shen, and Xiang-yang Li. 2017. S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet of Things Journal 4, 1 (2017), 88–100.
[4]
Anupam Das, Nikita Borisov, and Matthew Caesar. 2014. Do you hear what I hear? Fingerprinting smart devices through embedded acoustic components. In ACM SIGSAC Conference on Computer and Communications Security, CCS. 441–452.
[5]
Han Ding, Jinsong Han, Yanyong Zhang, Fu Xiao, Wei Xi, Ge Wang, and Zhiping Jiang. 2018. Preventing unauthorized access on passive tags. In IEEE Conference on Computer Communications, INFOCOM.
[6]
Ethan Gaebel, Ning Zhang, Wenjing Lou, and Y. Thomas Hou. 2016. Looks good to me: Authentication for augmented reality. In ACM International Workshop on Trustworthy Embedded Devices, TrustED. 57–67.
[7]
W. Huang, X. Yan, X. Y. Li, L. Hao, and Y. Liu. 2014. Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones. In IEEE Conference on Computer Communication, INFOCOM.
[8]
Rong Jin, Liu Shi, Kai Zeng, Amit Pande, and Prasant Mohapatra. 2016. MagPairing: Pairing smartphones in close proximity using magnetometers. IEEE Transactions on Information Forensics & Security, TIFS 11, 6 (2016), 1306–1320.
[9]
Zdenek Kalal, Krystian Mikolajczyk, and Jiri Matas. 2012. Tracking-learning-detection. IEEE Transactions on Pattern Analysis & Machine Intelligence, TPAMI 34, 7 (2012), 1409–1422.
[10]
Xiaohui Liang, Ronald Peterson, and David Kotz. 2020. Securely connecting wearables to ambient displays with user intent. IEEE Transactions on Dependable and Secure Computing, TDSC 17, 4 (2020), 676–690.
[11]
Sikun Lin, Hao Fei Cheng, Weikai Li, Zhanpeng Huang, Pan Hui, and Christoph Peylo. 2017. Ubii: Physical world interaction through augmented reality. IEEE Transactions on Mobile Computing, TMC 16, 3 (2017), 872–885.
[12]
Suhas Mathur, Robert Miller, Alexander Varshavsky, Wade Trappe, and Narayan Mandayam. 2011. ProxiMate: Proximity-based secure pairing using ambient wireless signals. In International Conference on Mobile Systems, Applications, and Services, MobiSys. 211–224.
[13]
Rene Mayrhofer and Hans Gellersen. 2009. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing, TMC 8, 6 (2009), 792–806.
[14]
J. M. Mccune, A. Perrig, and M. K. Reiter. 2005. Seeing-is-believing: Using camera phones for human-verifiable authentication. In IEEE Symposium on Security and Privacy, S&P. 110–124.
[15]
Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and Majid Sobhani. 2014. Context-based zero-interaction pairing and key evolution for advanced personal devices. In ACM SIGSAC Conference on Computer and Communications Security, CCS. 880–891.
[16]
Chunyi Peng, Guobin Shen, Yongguang Zhang, and Songwu Lu. 2009. Point&Connect: Intention-based device pairing for mobile phone users. In International Conference on Mobile Systems, Applications, and Services, MobiSys. 137–150.
[17]
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. 2016. Wanda: Securely introducing mobile devices. In IEEE Conference on Computer Communications, INFOCOM. 1–9.
[18]
Timothy J. Pierson, Travis Peters, Ronald Peterson, and David Kotz. 2019. Closetalker: Secure, short-range ad hoc wireless communication. In International Conference on Mobile Systems, Applications, and Services, MobiSys. 340–352.
[19]
J. L. G. Rivas, Pedro Cano Olivares, and Javier D. Alonso. 2013. Interactive techniques for entertainment applications using mobile devices. In Advances in Computational Intelligence. 334–345.
[20]
Carlos Ruiz, Shijia Pan, Adeola Bannis, Xinlei Chen, Carlee Joe-Wong, Hae Young Noh, and Pei Zhang. 2018. IDrone: Robust drone identification through motion actuation feedback. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 2, Article 80 (2018), 22 pages.
[21]
Enrico Rukzio, Karin Leichtenstern, Victor Callaghan, Paul Holleis, Albrecht Schmidt, and Jeannette Shiaw-Yuan Chin. 2006. An experimental comparison of physical mobile interaction techniques: Touching, pointing and scanning. In International Conference on Ubiquitous Computing, UbiComp. 87–104.
[22]
Nitesh Saxena, Jan Erik Ekberg, Kari Kostiainen, and N. Asokan. 2011. Secure device pairing based on a visual channel: Design and usability study. IEEE Transactions on Information Forensics & Security, TIFS 6, 1 (2011), 28–38.
[23]
Adin Scannell, Alexander Varshavsky, Anthony LaMarca, and Eyal de Lara. 2009. Amigo: Proximity-based authentication of mobile devices. International Journal of Security & Networks 4, 1/2 (2009), 4–16.
[24]
Dominik Schürmann and Stephan Sigg. 2013. Secure communication based on ambient audio. IEEE Transactions on Mobile Computing, TMC 12, 2 (2013), 358–370.
[25]
Jianqiang Sun, Lei Xie, Qingliang Cai, Chuyu Wang, Jie Wu, and Sanglu Lu. 2016. RF-ISee: Identify and distinguish multiple RFID tagged objects in augmented reality systems. In IEEE International Conference on Distributed Computing Systems, ICDCS. 723–724.
[26]
Zheng Sun, Aveek Purohit, Raja Bose, and Pei Zhang. 2015. Spartacus: Spatially-aware interaction for mobile devices through energy-efficient audio sensing. In International Conference on Mobile Systems, Applications, and Services, MobiSys, Vol. 18. 11–14.
[27]
Jingren Tang, Hong Cheng, Yang Zhao, and Hongliang Guo. 2018. Structured dynamic time warping for continuous hand trajectory gesture recognition. Pattern Recognition 80 (2018), 21–31.
[28]
T. V. Raghuand M. Kiran. 2022. A survey on device to device communications. In International Conference for Advancement in Technology (ICONAT). 1–6.
[29]
Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, and Jizhong Zhao. 2016. Instant and robust authentication and key agreement among mobile devices. In ACM Conference on Computer and Communications Security, CCS. 616–627.
[30]
Pengjin Xie, Jingchao Feng, Zhichao Cao, and Jiliang Wang. 2018. Genewave: Fast authentication and key agreement on commodity mobile devices. IEEE/ACM Transactions on Networking, TON 26, 4 (2018), 1688–1700.
[31]
Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, and Cong Wang. 2016. SBVLC: Secure barcode-based visible light communication for smartphones. IEEE Transactions on Mobile Computing, TMC 15, 2 (2016), 432–446.
[32]
Jiansong Zhang, Zeyu Wang, Zhice Yang, and Qian Zhang. 2017. Proximity based IoT device authentication. In IEEE Conference on Computer Communications, INFOCOM. 1–9.
[33]
J. Zhang, Z. Wang, Z. Yang, and Q. Zhang. 2017. Proximity based IoT device authentication. In IEEE Conference on Computer Communication, INFOCOM. 1–9.
[34]
Lan Zhang, Xiang-Yang Li, Wenchao Huang, Liu Kebin, Shuwei Zong, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, and Yunhao Liu. 2014. It starts with iGaze: Visual attention driven networking with smart glasses. In International Conference on Mobile Computing and Networking, MobiCom. 91–102.

Index Terms

  1. WVC: Towards Secure Device Paring for Mobile Augmented Reality

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Sensor Networks
    ACM Transactions on Sensor Networks  Volume 20, Issue 1
    January 2024
    717 pages
    EISSN:1550-4867
    DOI:10.1145/3618078
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 18 October 2023
    Online AM: 06 July 2023
    Accepted: 13 April 2023
    Revised: 21 February 2023
    Received: 27 January 2022
    Published in TOSN Volume 20, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Device pairing
    2. security
    3. mobile augmented reality

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China (NSFC)
    • Intelligent Policing Key Laboratory of Sichuan Province
    • Basic Research Plan of Shanxi Province
    • Virtual Teaching and Research Office of Cyber Security (BJPC) of the Ministry of Education
    • NSFC
    • NSFC

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 216
      Total Downloads
    • Downloads (Last 12 months)159
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 16 Oct 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media