216
edits
Line 8: | Line 8: | ||
== Project Description == | == Project Description == | ||
In | In preliminary studies, fingerprints from ambient audio have been utilised to generate a secure key among devices without the necessitiy of a trusted third party | ||
([http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6112755 1], [http://link.springer.com/chapter/10.1007%2F978-3-642-30973-1_31 2], [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6246148 3]) | ([http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6112755 1], [http://link.springer.com/chapter/10.1007%2F978-3-642-30973-1_31 2], [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6246148 3]). | ||
In this implementation, similar recordings of ambient audio from mobile devices in proximity are utilised for the generation of a secure key. | |||
An attacker that is farther away is not able to guess the same key with a recording of her own since the features in the ambient audio differ with location. | |||
[[File:AudioSynch.png]] | [[File:AudioSynch.png]] |
edits