Secure authentication from ambient audio: Difference between revisions

Jump to navigation Jump to search
Line 8: Line 8:


== Project Description ==
== Project Description ==
In a preliminary study, fingerprints from ambient audio have been utilised to generate a secure key among devices without the necessitiy of a trusted third party.
In preliminary studies, fingerprints from ambient audio have been utilised to generate a secure key among devices without the necessitiy of a trusted third party  
([http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6112755 1], [http://link.springer.com/chapter/10.1007%2F978-3-642-30973-1_31 2], [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6246148 3])
([http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6112755 1], [http://link.springer.com/chapter/10.1007%2F978-3-642-30973-1_31 2], [http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6246148 3]).
 
In this implementation, similar recordings of ambient audio from mobile devices in proximity are utilised for the generation of a secure key.
An attacker that is farther away is not able to guess the same key with a recording of her own since the features in the ambient audio differ with location.


[[File:AudioSynch.png]]
[[File:AudioSynch.png]]
216

edits

Navigation menu