Secure authentication from ambient audio: Difference between revisions
| (3 intermediate revisions by the same user not shown) | |||
| Line 13: | Line 13: | ||
In this implementation, similar recordings of ambient audio from mobile devices in proximity are utilised for the generation of a secure key. | In this implementation, similar recordings of ambient audio from mobile devices in proximity are utilised for the generation of a secure key. | ||
An attacker that is farther away is not able to guess the same key with a recording of her own since the features in the ambient audio differ with location. | An attacker that is farther away is not able to guess the same key with a recording of her own since the features in the ambient audio differ with location. | ||
However, the robustness of the generated key is dependent on properties of ambient audio. | |||
In previous studies, we experienced best pairing characteristics when devices are in an environment with a single loud audio source. | |||
When environmental noise is, however, more ubiquitous and noisy, it is easier for an attacker to generate a key that is similar to that of the legitimate communication partners. | |||
In this project we will develop a mechanism to adapt the parameter of the underlying approach to generate secure to changing environmental parameters. | |||
[[File:AudioSynch.png]] | |||
== Required Skills == | == Required Skills == | ||
* Natural curiosity, high motivation and a good sense of creativity :) | * Natural curiosity, high motivation and a good sense of creativity :) | ||
* | * Some basic understanding of machine learning techniques, audio-fingerprinting, error correction or fuzzy cryptograpy might be helpful but will also be acquired throughout the project (Since there are implementations already, none of these have to be done from scratch) | ||
* | * Experience with audio processing might be helpful but is not mandatory | ||