Secure authentication from ambient audio: Difference between revisions
| (4 intermediate revisions by the same user not shown) | |||
| Line 8: | Line 8: | ||
== Project Description == | == Project Description == | ||
In | In preliminary studies, fingerprints from ambient audio have been utilised to generate a secure key among devices without the necessitiy of a trusted third party | ||
([http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6112755 1], [http://link.springer.com/chapter/10.1007%2F978-3-642-30973-1_31 2], [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6246148 3]) | ([http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6112755 1], [http://link.springer.com/chapter/10.1007%2F978-3-642-30973-1_31 2], [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6246148 3]). | ||
In this implementation, similar recordings of ambient audio from mobile devices in proximity are utilised for the generation of a secure key. | |||
An attacker that is farther away is not able to guess the same key with a recording of her own since the features in the ambient audio differ with location. | |||
However, the robustness of the generated key is dependent on properties of ambient audio. | |||
In previous studies, we experienced best pairing characteristics when devices are in an environment with a single loud audio source. | |||
When environmental noise is, however, more ubiquitous and noisy, it is easier for an attacker to generate a key that is similar to that of the legitimate communication partners. | |||
In this project we will develop a mechanism to adapt the parameter of the underlying approach to generate secure to changing environmental parameters. | |||
[[File:AudioSynch.png]] | |||
== Required Skills == | == Required Skills == | ||
* Natural curiosity, high motivation and a good sense of creativity :) | * Natural curiosity, high motivation and a good sense of creativity :) | ||
* | * Some basic understanding of machine learning techniques, audio-fingerprinting, error correction or fuzzy cryptograpy might be helpful but will also be acquired throughout the project (Since there are implementations already, none of these have to be done from scratch) | ||
* | * Experience with audio processing might be helpful but is not mandatory | ||