SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices

Emil Bejder, Adam Krog Mathiasen, Michele De Donno, Nicola Dragoni, Xenofon Fafoutis

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

135 Downloads (Pure)


IoT security for resource-constrained devices is largely based on symmetric block ciphers, such as AES. In such resource-constrained contexts, and particularly in the case of large-scale IoT deployments with multiple devices, the installation of encryption keys can pose a significant challenge. This paper presents SHAKE (SHared Acceleration Key Establishment): a convenient means to generate and install secret keys in IoT devices during deployment. Using SHAKE, an IoT deployment technician can generate and install a shared encryption key on two devices by holding them together and shaking them. SHAKE, operating on each of the devices, captures these movements from an on-board accelerometer and generates a secret key based on the shared acceleration profile. We provide a proof-ofconcept implementation of SHAKE for the Contiki-NG operating system and assess its security against mimic attacks, that is the scenario whereby an eavesdropper with a clear line of sight to the deployment technician tries to mimic the random movements to generate the same key. Finally, we assess the energy requirements for generating a 128-bit key with SHAKE and we compare it against state-of-the-art methods for key generation.
Original languageEnglish
Title of host publicationProceedings of IEEE 6th World Forum on Internet of Things
Number of pages6
Publication date2020
Article number9221263
ISBN (Print)978-1-7281-5504-3
Publication statusPublished - 2020
Event6th IEEE World Forum on Internet of Things - Hilton New Orleans Riverside - ONLINE, New Orleans, United States
Duration: 2 Jun 202016 Jun 2020
Conference number: 6


Conference6th IEEE World Forum on Internet of Things
LocationHilton New Orleans Riverside - ONLINE
Country/TerritoryUnited States
CityNew Orleans
Internet address


  • Secret key generation
  • IoT security
  • IoT deployments
  • Resource-constrained devices
  • Internet of Things


Dive into the research topics of 'SHAKE: SHared Acceleration Key Establishment for Resource-Constrained IoT Devices'. Together they form a unique fingerprint.

Cite this