LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Wiseman, Sarah; Soto Mino, Gustavo; Cox, Anna L.; Gould, Sandy J. J.; Moore, Joanne; Needham, Chris
Languages: English
Types: Article
Subjects:
The Internet of Things is connecting an ever-increasing number\ud of devices. These devices often require access to personal\ud information, but their meagre user interfaces usually do not\ud permit traditional modes of authentication. On such devices,\ud one-time pairing codes are often used instead. This pairing\ud process can involve transcribing randomly generated alphanumeric\ud codes, which can be frustrating, slow and error-prone.\ud In this paper, we present an improved pairing method that uses\ud sets of English words instead of random strings. The word\ud method, although longer in terms of character length, allows\ud users to pair devices more quickly, whilst still maintaining the\ud complexity necessary for secure interactions.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Commun. ACM 42, 12 (1999), 40-46. DOI: http://dx.doi.org/10.1145/322796.322806
    • 2. Dirk Balfanz, Diana K Smetters, Paul Stewart, and H Chi Wong. 2002. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In NDSS.
    • 3. Julia Barret and Helmut Krueger. 1994. Performance effects of reduced proprioceptive feedback on touch typists and casual users in a typing task. Behaviour & Information Technology 13, 6 (1994). DOI: http://dx.doi.org/10.1080/01449299408914618
    • 4. Berg Cloud Limited. 2014. Cloud Wash. (2014). http://bergcloud.com/case-studies/cloudwash/
    • 5. Roy Brener. 1940. An experimental investigation of memory span. Journal of Experimental Psychology 26, 5 (1940), 467-482. DOI:http://dx.doi.org/10.1037/h0061096
    • 6. Duncan P. Brumby, Anna L. Cox, Jonathan Back, and Sandy J. J. Gould. 2013. Recovering from an interruption: Investigating speed-accuracy trade-offs in task resumption behavior. Journal of Experimental Psychology: Applied 19, 2 (2013), 95-107. DOI:http://dx.doi.org/10.1037/a0032696
    • 7. Abigail Cauchi, Andy Gimblett, Harold Thimbleby, Paul Curzon, and Paolo Masci. 2012. Safer "5-key" number entry user interfaces using Differential Formal Analysis. In Proceedings of the 2012 BCS Conference on Human-Computer Interaction. 29-38.
    • 8. Easy Bulb. 2015. Easy Bulb. (2015). http://easybulb.com/
    • 9. EMC Corporation. 2015. RSA. (2015). http://www.emc.com/domains/rsa/index.htm
    • 10. Melissa A Gallagher and Michael D Byrne. 2015. Modeling Password Entry on a Mobile Device Modeling. In Proceedings of the International Conference on Cognitive Modeling. 45-50.
    • 11. Richard H Guski, Raymond C Larson, Syephen M Matyas Jr, Donald B Johnson, and Don Coppersmith. 1997. Authentication system using one-time passwords. (1997). https://www.google.com/patents/US5592553
    • 12. Sandra G. Hart and Lowell E. Staveland. 1988. Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research. Advances in psychology 52 (1988), 139-183. DOI: http://dx.doi.org/10.1016/S0166-4115(08)62386-9
    • 13. Eve Hoggan, Stephen A Brewster, and Jody Johnston. 2008. Investigating the Effectiveness of Tactile Feedback for Mobile Touchscreens. In Proceedings of the SIGCHI conference on Human factors in computing systems. 1573-1582. DOI: http://dx.doi.org/10.1145/1357054.1357300
    • 14. Phillip Inglesant and M. Angela Sasse. 2010. The true cost of unusable password policies: password use in the wild. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 383-392. DOI: http://dx.doi.org/10.1145/1753326.1753384
    • 15. Ronald Kainda, Ivan Flechais, and A.W. Roscoe. 2009. Usability and Security of Out-Of-Band Channels in Secure Device Pairing Protocols. In Symposium on Usable Privacy and Security. DOI:http://dx.doi.org/10.1145/1572532.1572547
    • 16. Ronald Kainda, Ivan Flechais, and A. W. Roscoe. 2010. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 6033 (2010), 308-315. DOI: http://dx.doi.org/10.1007/978-3-642-12368-9
    • 17. Alfred Kobsa, Gene Tsudik, and Yang Wang. 2009. Serial Hook-ups : A Comparative Usability Study of Secure Device Pairing Methods. In Proceedings of the 5th Symposium on Usable Privacy and Security. DOI: http://dx.doi.org/10.1145/1572532.1572546
    • 18. Nest Labs. 2015. Nest. (2015). https://nest.com/
    • 19. Sean O'Haplin, Chris Needham, and Michael Barroco. 2014. The Cross Platform Authentication Protocol. Technical Report September. EBU Operating Eurovision And Euroradio, Geneva. 1-39 pages.
    • 20. Adrian Perrig and Dawn Song. 1999. Hash Visualization : a New Technique to improve Real-World Security. International Workshop on Cryptographic Techniques and E-Commerce (1999), 1-8.
    • 21. Ramnath Prasad and Nitesh Saxena. 2008. Efficient device pairing using "human-comparable" synchronized audiovisual patterns. In Applied Cryptography and Network Security. 328-345. DOI: http://dx.doi.org/10.1007/978-3-540-68914-0{_}20
    • 22. Timothy A. Salthouse. 1986. Perceptual, cognitive, and motoric aspects of transcription typing. Psychological bulletin 99, 3 (1986), 303-319. DOI: http://dx.doi.org/10.1037/0033-2909.99.3.303
    • 23. Jan Maarten Schraagen and Kees van Dongen. 2005. Designing a licence plate for memorability. Ergonomics 48, 7 (2005), 796-806. DOI: http://dx.doi.org/10.1080/00140130500123720
    • 24. Reginald Smith. 2012. Distinct word length frequencies: distributions and symbol entropies. Glottometrics 23 (2012), 7-22.
    • 25. Ersin Uzun, Kristiina Karvonen, and N. Asokan. 2007. Usability Analysis of Secure Pairing Methods. Financial Cryptography and Data Security (2007), 307-324. DOI: http://dx.doi.org/10.1007/978-3-540-77366-5_29
    • 26. Sarah Wiseman, Anna L. Cox, Duncan P. Brumby, Sandy J. J. Gould, and Sarah O'Carroll. 2013a. Using Checksums to Detect Number Entry Error. In Proceedings of the SIGCHI Conference on Human Factors in Computing. 2403-2406. DOI: http://dx.doi.org/10.1145/2470654.2481332
    • 27. Sarah Wiseman, Orla Hennessy, Anna L. Cox, and Duncan P. Brumby. 2013b. Tailoring Number Entry Interfaces To The Task of Programming Medical Infusion Pumps. In International Annual Meeting of the Human Factors and Ergonomics Society. 683-687. DOI: http://dx.doi.org/10.1177/1541931213571148
  • No related research data.
  • No similar publications.

Share - Bookmark

Funded by projects

Cite this article