skip to main content
10.1145/2986416.2986420acmotherconferencesArticle/Chapter ViewAbstractPublication PagesamConference Proceedingsconference-collections
research-article

Spontaneous Device Association Using Inaudible Audio Signatures

Published:04 October 2016Publication History

ABSTRACT

We describe a system that uses high-frequency audio signatures for spontaneous device association between mobile devices and physical end-points in smart environments. The system utilizes a method for extracting signatures from recorded audio signals, which we evaluated in two conditions: indoor, where background noise consists of workplace sounds, and urban, where the system is tested in a noisy outdoor setting. The system performed reliably both indoors (100% at distances up to 5 m) and outdoors (97.3% -- 100% at distances up to 5 m), and a slight performance drop was measured when the mobile device was allowed to move freely (89.2% indoors, 84.1% outdoors). Further, we evaluated the system's performance with an occluded receiver, and measured the battery consumption on the mobile device. Our system provides a practical and reliable means for ad-hoc service and object discovery in urban computing settings.

References

  1. Balfanz, Smetters, K., Stewart, P. and Wong, H.C. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of the 202 Network and Distributed Systems Security Symposium (NDSS'02). 2002.Google ScholarGoogle Scholar
  2. Chong, M.K., Mayrhofer, R. and Gellersen, H. A survey of user interaction for spontaneous device association. ACM Computing Surveys (CSUR) 47, 1 (2014), 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chong, M.K. and Gellersen, H. Classification of spontaneous device association from a usability perspective. In Proceedings of the 2nd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI / SPMU 2010). 2010, 1--7.Google ScholarGoogle Scholar
  4. Circle 38 Inc. Circle 38 Inc. http://circlewithme.tumblr.com/Google ScholarGoogle Scholar
  5. Claycomb, W.R. and Shin, D. Secure device pairing using audio. In Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on. 2009, 77--84.Google ScholarGoogle Scholar
  6. Codrescu, L., Anderson, W., Venkumanhanti, S., Zeng, M., et al. Hexagon DSP: An architecture optimized for mobile multimedia and communications. Micro, IEEE 34, 2 (2014), 34--43.Google ScholarGoogle ScholarCross RefCross Ref
  7. Edwards, W.K. Discovery systems in ubiquitous computing. Pervasive Computing, IEEE 5, 2 (2006), 70--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G. and Uzun, E. Loud and clear: Human-verifiable authentication based on audio. In Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on. 2006, 10--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Guest Mode - Chromecast. https://support.google.com/chromecast/answer/6279388?hl=enGoogle ScholarGoogle Scholar
  10. Hamming, R.W. Error detecting and error correcting codes. Bell System technical journal 29, 2 (1950), 147--160.Google ScholarGoogle Scholar
  11. Heikkinen, T., Luojus, P. and Ojala, T. UbiBroker: Event-based Communication Architecture for Pervasive Display Networks. Proc. PD-Apps 14, (2014).Google ScholarGoogle Scholar
  12. Hinckley, K. Synchronous gestures for multiple persons and computers. In Proceedings of the 16th annual ACM symposium on User interface software and technology. 2003, 149--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., et al. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Ubicomp 2001: Ubiquitous Computing. 2001, 116--122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kindberg, T. and Zhang, K. Secure spontaneous device association. In Ubicomp. 2003, 124--131.Google ScholarGoogle Scholar
  15. Kindberg, T. and Zhang, K. Securing Spontaneous Interactions. In Proceedings of the 2nd UK-UbiNet Workshop. 2004.Google ScholarGoogle Scholar
  16. Kukka, H., Kruger, F., Kostakos, V., Ojala, T. and Jurmu, M. Information to go: exploring in-situ information pick-up In the Wild. In Human-Computer Interaction--INTERACT 2011. Springer, 2011, 487--504. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Kukka, H., Oja, H., Kostakos, V., Gonçalves, J. and Ojala, T. What makes you click: exploring visual signals to entice interaction on public displays. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2013, 1699--1708. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kukka, H., Ylipulli, J., Luusua, A. and Dey, A.K. Urban computing in theory and practice: towards a transdisciplinary approach. In Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational. 2014, 658--667. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Kumar, A., Saxena, N., Tsudik, G. and Uzun, E. A comparative study of secure device pairing methods. Pervasive and Mobile Computing 5, 6 (2009), 734--749. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Mayrhofer, R. and Welch, M. A human-verifiable authentication protocol using visible laser light. In Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on. 2007, 1143--1148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. McCune, J.M., Perrig, A. and Reiter, M.K. Seeing-isbelieving: Using camera phones for human-verifiable authentication. In 2005 IEEE symposium on Security and privacy. 2005, 110--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Patel, S.N., Pierce, J.S. and Abowd, G.D. A gesture-based authentication scheme for untrusted public terminals. In Proceedings of the 17th annual ACM symposium on User interface software and technology. 2004, 157--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Soriente, C., Tsudik, G. and Uzun, E. Information Security. Information Security, 2008, 385--400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Uzun, E., Karvonen, K. and Asokan, N. Usability analysis of secure pairing methods. Financial Cryptography and Data Security, 2007, 307--324. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Vaudenay, S. Secure communications over insecure channels based on short authenticated strings. In Advances in cryptology--CRYPTO 2005. 2005, 309--326. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    AM '16: Proceedings of the Audio Mostly 2016
    October 2016
    285 pages
    ISBN:9781450348225
    DOI:10.1145/2986416

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 4 October 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    AM '16 Paper Acceptance Rate40of53submissions,75%Overall Acceptance Rate177of275submissions,64%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader