BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Context-Based Zero-Interaction Authentication - Neil Klingensmith 
 (Loyola University Chicago)
DTSTART:20190912T140000Z
DTEND:20190912T150000Z
UID:TALK128941@talks.cam.ac.uk
CONTACT:Marco Caballero
DESCRIPTION:Abstract:\nFor the past several years\, enthusiastic and ambit
 ious projections have been made for the rapid growth of the Internet-of-Th
 ings (IoT) ecosystem. Intel\, for instance\, has predicted that by next ye
 ar (2020)\, the number of connected IoT devices will grow to around 200 bi
 llion worldwide\, which is more than 20 devices for every person. Where ar
 e all these IoT devices? It turns out that over 70% of currently deployed 
 IoT devices are in business\, manufacturing\, and healthcare sectors\, and
  domestic and personal IoT devices seem to be concentrated only in the han
 ds of enthusiastic early adopters\, but not the general public. Increasing
  the adoption of these devices will require them to become easier to use.\
 n\nOne of the main hindrances to the adoption of IoT is the long-standing 
 tension between security and usability. In particular\, one of the paramou
 nt concerns that have continued to vex researchers is the question of how 
 to quickly\, securely\, and effortlessly establish a common security key b
 etween a newly introduced device and an existing network and to subsequent
 ly manage the established connection securely. This is an extremely import
 ant problem because key establishment is one of the first configuration st
 eps that needs to be done after powering a device on. And\, because IoT de
 vices often have simplistic user interfaces\, it is often one of the clums
 iest steps. The goal of this work is to make key configuration transparent
 .\n\nContext-based pairing and authentication is a promising solution to t
 his challenge. It exploits spatiotemporal randomness in the ambient enviro
 nment (e.g.\, audio\, luminosity\, or received signal strength indicator)\
 , often called contextual information. Devices that use context-based secu
 rity take advantage of the fact that the common contextual information is 
 shared only by a limited group of closely located devices. In this talk\, 
 we will discuss ways that we can use context-based pairing to transparentl
 y commission a new IoT device: to set it up\, all you have to do is plug i
 t in. We will discuss the difficulties with zero-involvement context-based
  pairing work\, including reliability\, key randomness\, and key reconcili
 ation.\n\nBio:\nI'm an assistant professor of Computer Science at Loyola U
 niversity Chicago. I work on hardware and software for cyber-physical syst
 ems. My goal is to make IoT systems more efficient\, reliable\, and secure
 . Previously\, I was a grad student in Computer Engineering at Wisconsin i
 n the Wisely lab.”
LOCATION:FW26\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
