ABSTRACT
We describe a system that uses high-frequency audio signatures for spontaneous device association between mobile devices and physical end-points in smart environments. The system utilizes a method for extracting signatures from recorded audio signals, which we evaluated in two conditions: indoor, where background noise consists of workplace sounds, and urban, where the system is tested in a noisy outdoor setting. The system performed reliably both indoors (100% at distances up to 5 m) and outdoors (97.3% -- 100% at distances up to 5 m), and a slight performance drop was measured when the mobile device was allowed to move freely (89.2% indoors, 84.1% outdoors). Further, we evaluated the system's performance with an occluded receiver, and measured the battery consumption on the mobile device. Our system provides a practical and reliable means for ad-hoc service and object discovery in urban computing settings.
- Balfanz, Smetters, K., Stewart, P. and Wong, H.C. Talking to strangers: Authentication in ad-hoc wireless networks. In Proceedings of the 202 Network and Distributed Systems Security Symposium (NDSS'02). 2002.Google Scholar
- Chong, M.K., Mayrhofer, R. and Gellersen, H. A survey of user interaction for spontaneous device association. ACM Computing Surveys (CSUR) 47, 1 (2014), 8. Google ScholarDigital Library
- Chong, M.K. and Gellersen, H. Classification of spontaneous device association from a usability perspective. In Proceedings of the 2nd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI / SPMU 2010). 2010, 1--7.Google Scholar
- Circle 38 Inc. Circle 38 Inc. http://circlewithme.tumblr.com/Google Scholar
- Claycomb, W.R. and Shin, D. Secure device pairing using audio. In Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on. 2009, 77--84.Google Scholar
- Codrescu, L., Anderson, W., Venkumanhanti, S., Zeng, M., et al. Hexagon DSP: An architecture optimized for mobile multimedia and communications. Micro, IEEE 34, 2 (2014), 34--43.Google ScholarCross Ref
- Edwards, W.K. Discovery systems in ubiquitous computing. Pervasive Computing, IEEE 5, 2 (2006), 70--77. Google ScholarDigital Library
- Goodrich, M.T., Sirivianos, M., Solis, J., Tsudik, G. and Uzun, E. Loud and clear: Human-verifiable authentication based on audio. In Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on. 2006, 10--10. Google ScholarDigital Library
- Guest Mode - Chromecast. https://support.google.com/chromecast/answer/6279388?hl=enGoogle Scholar
- Hamming, R.W. Error detecting and error correcting codes. Bell System technical journal 29, 2 (1950), 147--160.Google Scholar
- Heikkinen, T., Luojus, P. and Ojala, T. UbiBroker: Event-based Communication Architecture for Pervasive Display Networks. Proc. PD-Apps 14, (2014).Google Scholar
- Hinckley, K. Synchronous gestures for multiple persons and computers. In Proceedings of the 16th annual ACM symposium on User interface software and technology. 2003, 149--158. Google ScholarDigital Library
- Holmquist, L.E., Mattern, F., Schiele, B., Alahuhta, P., et al. Smart-its friends: A technique for users to easily establish connections between smart artefacts. In Ubicomp 2001: Ubiquitous Computing. 2001, 116--122. Google ScholarDigital Library
- Kindberg, T. and Zhang, K. Secure spontaneous device association. In Ubicomp. 2003, 124--131.Google Scholar
- Kindberg, T. and Zhang, K. Securing Spontaneous Interactions. In Proceedings of the 2nd UK-UbiNet Workshop. 2004.Google Scholar
- Kukka, H., Kruger, F., Kostakos, V., Ojala, T. and Jurmu, M. Information to go: exploring in-situ information pick-up In the Wild. In Human-Computer Interaction--INTERACT 2011. Springer, 2011, 487--504. Google ScholarDigital Library
- Kukka, H., Oja, H., Kostakos, V., Gonçalves, J. and Ojala, T. What makes you click: exploring visual signals to entice interaction on public displays. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2013, 1699--1708. Google ScholarDigital Library
- Kukka, H., Ylipulli, J., Luusua, A. and Dey, A.K. Urban computing in theory and practice: towards a transdisciplinary approach. In Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational. 2014, 658--667. Google ScholarDigital Library
- Kumar, A., Saxena, N., Tsudik, G. and Uzun, E. A comparative study of secure device pairing methods. Pervasive and Mobile Computing 5, 6 (2009), 734--749. Google ScholarDigital Library
- Mayrhofer, R. and Welch, M. A human-verifiable authentication protocol using visible laser light. In Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on. 2007, 1143--1148. Google ScholarDigital Library
- McCune, J.M., Perrig, A. and Reiter, M.K. Seeing-isbelieving: Using camera phones for human-verifiable authentication. In 2005 IEEE symposium on Security and privacy. 2005, 110--124. Google ScholarDigital Library
- Patel, S.N., Pierce, J.S. and Abowd, G.D. A gesture-based authentication scheme for untrusted public terminals. In Proceedings of the 17th annual ACM symposium on User interface software and technology. 2004, 157--160. Google ScholarDigital Library
- Soriente, C., Tsudik, G. and Uzun, E. Information Security. Information Security, 2008, 385--400. Google ScholarDigital Library
- Uzun, E., Karvonen, K. and Asokan, N. Usability analysis of secure pairing methods. Financial Cryptography and Data Security, 2007, 307--324. Google ScholarDigital Library
- Vaudenay, S. Secure communications over insecure channels based on short authenticated strings. In Advances in cryptology--CRYPTO 2005. 2005, 309--326. Google ScholarDigital Library
Recommendations
Spontaneous mobile device authentication based on sensor data
AbstractSmall, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets, wireless LAN access points, or printers, often need to communicate securely over wireless networks. Active attacks can only be ...
SONDI: audio-based device discovery and pairing for smart environments
NordiCHI '14: Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, FoundationalIn this paper we propose a system called SONDI that uses high frequency audio signals (called audio signatures) to pair mobile devices with fixed devices in smart environments. The system allows users to discover interaction possibilities in the ...
Research on multi-agent service bundle middleware for smart space
RSKT'06: Proceedings of the First international conference on Rough Sets and Knowledge TechnologyUbiquitous computing as the integration of sensors, smart devices, and intelligent technologies to form a “smart space” environment relies on the development of both middleware and networking technologies. To realize the environments, it is important to ...
Comments