USING A SPATIAL CONTEXT AUTHENTICATION PROXY FOR ESTABLISHING SECURE WIRELESS CONNECTIONS
Keywords:
spontaneous interaction, wireless and mobile security, authentication, location awarenessAbstract
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wireless network. Secure communication with such devices is difficult because of the required authentication, which is often either password- or certificate-based. An intuitive alternative is context-based authentication, where device authenticity is verified by shared context, and often by direct physical evidence. Devices that are physically separated cannot experience the same context and thus cannot benefit directly from context authentication. We introduce a context authentication proxy that is pre-authenticated with one of the devices and can authenticate with the other by shared context. This concept is applicable to a wide range of application scenarios, context sensing technologies, and trust models. We show its practicality in an implementation for setting up IPSec connections based on spatial reference. Our specific scenario is ad-hoc access of mobile devices to secure 802.11 WLANs using a mobile device as authentication proxy. A user study shows that our method and implementation are intuitive to use and compare favourably to a standard, password-based approach.
Downloads
References
D. Balfanz, G. Durfee, R. E. Grinter, D. K. Smetters, and P Stewart. Network-in-a-box: How to
set up a secure wireless network in under a minute. In Proc. 13th USENIX Security Symp., pages
–222. USENIX, August 2004.
D. Balfanz, D. K. Smetters, P. Stewart, and H. C. Wong. Talking to strangers: Authentication
in ad-hoc wireless networks. In Proc. NDSS’02: 2002 Network and Distributed Systems Security
Symp. The Internet Society, February 2002.
A. Godber and P. Dasgupta. Secure wireless gateway. In Proc. WiSE’02: 3rd ACM workshop on
Wireless security, pages 41–46. ACM Press, 2002.
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun. Loud and clear: Human verifiable
authentication based on audio. In Proc. ICDCS 2006: 26th Conf. on Distributed Computing
Systems, page 10. IEEE CS Press, July 2006.
P. Gutmann. Plug-and-play PKI: A PKI your mother can use. In Proc. 12th USENIX Security
Symp., pages 45–58, August 2003. published at http://www.cs.auckland.ac.nz/~pgut001/pubs/
usenix03.pdf, shorter version appeared in IEEE Computer Magazine, August 2002.
M. Hazas, C. Kray, H. Gellersen, H. Agbota, G. Kortuem, and A. Krohn. A relative positioning
system for co-located mobile devices. In Proc. MobiSys 2005: 3rd Int. Conf. on Mobile Systems,
Applications, and Services, pages 177–190. ACM Press, June 2005.
Jens Jakobsen. Chillispot web page. http://www.chillispot.org, 2006.
T. Kindberg, K. Zhang, and N. Shankar. Context authentication using constrained channels.
In Proc. WMCSA: 4th IEEE Workshop on Mobile Computing Systems and Applications, pages
–21. IEEE CS Press, June 2002.
G. Kortuem, C. Kray, and H. Gellersen. Sensing and visualizing spatial relations of mobile devices.
In Proc. UIST 2005: 18th ACM Symp. on User Interface Software and Technology, pages 93–102.
ACM Press, October 2005.
R. Mayrhofer. Towards an open source toolkit for ubiquitous device authentication. In Workshops
Proc. PerCom 2007: 5th IEEE International Conference on Pervasive Computing and Communications,
pages 247–252. IEEE CS Press, March 2007. Track PerSec 2007: 4th IEEE International
Workshop on Pervasive Computing and Communication Security.
R. Mayrhofer and Esys GmbH. Gibraltar firewall web page. http://www.gibraltar.at, 2006.
R. Mayrhofer and H. Gellersen. On the security of ultrasound as out-of-band channel. In Proc.
IPDPS 2007: 21st IEEE International Parallel and Distributed Processing Symposium, page 321.
IEEE CS Press, March 2007. Track SSN 2007: 3rd International Workshop on Security in Systems
and Networks.
R. Mayrhofer, H. Gellersen, and M. Hazas. Security by spatial reference: Using relative positioning
to authenticate devices for spontaneous interaction. In Proc. Ubicomp 2007: 9th International
Conference on Ubiquitous Computing, LNCS. Springer-Verlag, September 2007. to appear.
R. Mayrhofer, F. Ortner, A. Ferscha, and M. Hechinger. Securing passive objects in mobile ad-hoc
peer-to-peer networks. In R. Focardi and G. Zavattaro, editors, Electronic Notes in Theoretical
Computer Science, volume 85.3. Elsevier Science, June 2003.
J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for humanverifiable
authentication. In Proc. IEEE Symp. on Security and Privacy, pages 110–124. IEEE CS
Press, May 2005.
OpenWrt. OpenWrt web page. http://openwrt.org, 2006.
R. Steffen and R. Knorr. A trust based delegation system for managing access control. In Advances
in Pervasive Computing: Adjunct Proc. Pervasive 2005, volume 191, pages 1–5. Austrian Computer
Society (OCG), April 2005.
C. Swindells, K. M. Inkpen, J. C. Dill, and M. Tory. That one there! pointing to establish device
identity. In Proc. UIST ’02: 15th ACM Symp. on User interface software and technology, pages
–160. ACM Press, 2002.
Xelerance Corporation. Openswan web page. http://www.openswan.org, 2006.