Pattern-Based Alignment of Audio Data for Ad Hoc Secure Device Pairing

When studying the use of ambient audio to generate a secure cryptographic shared key among mobile phones, we encounter a misalignment problem for recorded audio data. The diversity in software and hardware causes mobile phones to produce badly-aligned audio chunks. It decreases the identical fraction in audio samples recorded in nearby mobile phones and consequently the common information available to create a secure key. Unless the mobile devices are real-time capable, this problem can not be solved with standard distributed time synchronisation approaches. We propose a pattern-based approximative matching process to achieve synchronisation independently on each device. Our experimental results show that this method can help to improve the similarity of the audio fingerprints, which are the source to create the communication key.

[1]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[2]  René Mayrhofer,et al.  The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams , 2007, ESAS.

[3]  Bernt Schiele,et al.  Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.

[4]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System , 2002, ISMIR.

[5]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System With an Efficient Search Strategy , 2003 .

[6]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[7]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[8]  Yusheng Ji,et al.  PINtext: A Framework for Secure Communication Based on Context , 2011, MobiQuitous.

[9]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[10]  Michael Sirivianos,et al.  Loud and Clear: Human-Verifiable Authentication Based on Audio , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[11]  Pedro Cano,et al.  A Review of Audio Fingerprinting , 2005, J. VLSI Signal Process..

[12]  René Mayrhofer,et al.  Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.

[13]  M S Waterman,et al.  Identification of common molecular subsequences. , 1981, Journal of molecular biology.

[14]  Mario Huemer,et al.  Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.

[15]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).