Use Your Words: Designing One-time Pairing Codes to\ud Improve User Experience

Article English OPEN
Wiseman, Sarah ; Soto Mino, Gustavo ; Cox, Anna L. ; Gould, Sandy J. J. ; Moore, Joanne ; Needham, Chris

The Internet of Things is connecting an ever-increasing number\ud of devices. These devices often require access to personal\ud information, but their meagre user interfaces usually do not\ud permit traditional modes of authentication. On such devices,\ud one-time pairing codes are often used instead. This pairing\ud process can involve transcribing randomly generated alphanumeric\ud codes, which can be frustrating, slow and error-prone.\ud In this paper, we present an improved pairing method that uses\ud sets of English words instead of random strings. The word\ud method, although longer in terms of character length, allows\ud users to pair devices more quickly, whilst still maintaining the\ud complexity necessary for secure interactions.
  • References (27)
    27 references, page 1 of 3

    1. Anne Adams and Martina Angela Sasse. 1999. Users are not the enemy. Commun. ACM 42, 12 (1999), 40-46. DOI:

    2. Dirk Balfanz, Diana K Smetters, Paul Stewart, and H Chi Wong. 2002. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In NDSS.

    3. Julia Barret and Helmut Krueger. 1994. Performance effects of reduced proprioceptive feedback on touch typists and casual users in a typing task. Behaviour & Information Technology 13, 6 (1994). DOI:

    4. Berg Cloud Limited. 2014. Cloud Wash. (2014).

    5. Roy Brener. 1940. An experimental investigation of memory span. Journal of Experimental Psychology 26, 5 (1940), 467-482. DOI:

    6. Duncan P. Brumby, Anna L. Cox, Jonathan Back, and Sandy J. J. Gould. 2013. Recovering from an interruption: Investigating speed-accuracy trade-offs in task resumption behavior. Journal of Experimental Psychology: Applied 19, 2 (2013), 95-107. DOI:

    7. Abigail Cauchi, Andy Gimblett, Harold Thimbleby, Paul Curzon, and Paolo Masci. 2012. Safer "5-key" number entry user interfaces using Differential Formal Analysis. In Proceedings of the 2012 BCS Conference on Human-Computer Interaction. 29-38.

    8. Easy Bulb. 2015. Easy Bulb. (2015).

    9. EMC Corporation. 2015. RSA. (2015).

    10. Melissa A Gallagher and Michael D Byrne. 2015. Modeling Password Entry on a Mobile Device Modeling. In Proceedings of the International Conference on Cognitive Modeling. 45-50.

  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    Goldsmiths Research Online - IRUS-UK 0 169
Share - Bookmark