Secure Communication Based on Ambient Audio

We propose to establish a secure communication channel among devices based on similar audio patterns. Features from ambient audio are used to generate a shared cryptographic key between devices without exchanging information about the ambient audio itself or the features utilized for the key generation process. We explore a common audio-fingerprinting approach and account for the noise in the derived fingerprints by employing error correcting codes. This fuzzy-cryptography scheme enables the adaptation of a specific value for the tolerated noise among fingerprints based on environmental conditions by altering the parameters of the error correction and the length of the audio samples utilized. In this paper, we experimentally verify the feasibility of the protocol in four different realistic settings and a laboratory experiment. The case studies include an office setting, a scenario where an attacker is capable of reproducing parts of the audio context, a setting near a traffic loaded road, and a crowded canteen environment. We apply statistical tests to show that the entropy of fingerprints based on ambient audio is high. The proposed scheme constitutes a totally unobtrusive but cryptographically strong security mechanism based on contextual information.

[1]  Ye Li,et al.  Biometrics based novel key distribution solution for body sensor networks , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[2]  David L. Mills,et al.  Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010, RFC.

[3]  Raymond Chi-Wing Wong,et al.  Query by Humming , 2009, Encyclopedia of Database Systems.

[4]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[5]  N. Kuiper Tests concerning random points on a circle , 1960 .

[6]  William P. Birmingham,et al.  HMM-based musical query retrieval , 2002, JCDL '02.

[7]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[8]  Avery Wang,et al.  An Industrial Strength Audio Search Algorithm , 2003, ISMIR.

[9]  Lin Cai,et al.  Secret Key Generation and Agreement in UWB Communication Channels , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[10]  Bernt Schiele,et al.  Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.

[11]  Luc Brun,et al.  A Robust Audio Fingerprint's Based Identification Method , 2007, IbPRIA.

[12]  Jonathan Katz,et al.  Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets , 2006, IEEE Transactions on Information Theory.

[13]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[14]  Christos N. Pitelis,et al.  Clusters and Globalisation:The Development of Urban and Regional Economies , 2006 .

[15]  René Mayrhofer,et al.  Shake Well Before Use: Authentication Based on Accelerometer Data , 2007, Pervasive.

[16]  Pedro Cano,et al.  A review of algorithms for audio fingerprinting , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..

[17]  René Mayrhofer,et al.  Spontaneous mobile device authentication based on sensor data , 2008, Inf. Secur. Tech. Rep..

[18]  Shumeet Baluja,et al.  Waveprint: Efficient wavelet-based audio fingerprinting , 2008, Pattern Recognit..

[19]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[20]  Jürgen Herre,et al.  Robust matching of audio signals using spectral flatness features , 2001, Proceedings of the 2001 IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics (Cat. No.01TH8575).

[21]  Cheng Yang,et al.  Efficient acoustic index for music retrieval with various degrees of similarity , 2002, MULTIMEDIA '02.

[22]  Lutz Prechelt,et al.  An interface for melody input , 2001, TCHI.

[23]  Jaap A. Haitsma,et al.  Robust Audio Hashing for Content Identification , 2001 .

[24]  Ton Kalker,et al.  A Highly Robust Audio Fingerprinting System , 2002, ISMIR.

[25]  Ricardo A. Baeza-Yates,et al.  Fast and Practical Approximate String Matching , 1992, Inf. Process. Lett..

[26]  John C. Platt,et al.  Distortion discriminant analysis for audio fingerprinting , 2003, IEEE Trans. Speech Audio Process..

[27]  Barry Vercoe,et al.  Melody retrieval on the web , 2001, IS&T/SPIE Electronic Imaging.

[28]  Mario Huemer,et al.  Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[29]  M. Stephens The goodness-of-fit statistic VN: distribution and significance points , 1965 .

[30]  Henrique S. Malvar,et al.  Using audio fingerprinting for duplicate detection and thumbnail generation , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[31]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[32]  Avery Wang,et al.  The Shazam music recognition service , 2006, CACM.

[33]  Pedro Cano,et al.  A Review of Audio Fingerprinting , 2005, J. VLSI Signal Process..

[34]  Ian H. Witten,et al.  Towards the digital music library: tune retrieval from acoustic input , 1996, DL '96.

[35]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[36]  David L. Mills Improved algorithms for synchronizing computer network clocks , 1995, IEEE/ACM Trans. Netw..

[37]  M. A. Stephens,et al.  The Goodness-Of-Fit Statistic V n : Distribution and Significance Points , 1965 .

[38]  Paul Lukowicz,et al.  Symbolic Object Localization Through Active Sampling of Acceleration and Sound Signatures , 2007, UbiComp.

[39]  Edgar Chávez,et al.  A Robust Entropy-Based Audio-Fingerprint , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[40]  Lawrence R. Rabiner,et al.  A tutorial on Hidden Markov Models , 1986 .

[41]  David L. Mills,et al.  Precision synchronization of computer network clocks , 1994, CCRV.

[42]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[43]  David L. Mills Improved algorithms for synchronizing computer network clocks , 2001 .

[44]  Claude Castelluccia,et al.  An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[45]  René Mayrhofer,et al.  The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams , 2007, ESAS.

[46]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[47]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[48]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[49]  Lahouari Ghouti,et al.  A Robust Perceptual Audio Hashing using Balanced Multiwavelets , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[50]  Ee-Chien Chang,et al.  Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.

[51]  Cheng Yang MACS: music audio characteristic sequence indexing for similarity retrieval , 2001, Proceedings of the 2001 IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics (Cat. No.01TH8575).

[52]  Kevin Fenzi,et al.  Linux Security Howto , 2000 .

[53]  Les E. Atlas,et al.  Modulation frequency features for audio fingerprinting , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[54]  F. Hao,et al.  On using fuzzy data in security mechanisms , 2007 .

[55]  Albrecht Schmidt,et al.  Physical Prototyping with Smart-its Embedded Ubiquitous Computing Systems , 2022 .

[56]  Eyal de Lara,et al.  Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.

[57]  S. Meier,et al.  IEEE 1588 syntonization and synchronization functions completely realized in hardware , 2008, 2008 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.

[58]  Dennis Shasha,et al.  Warping indexes with envelope transforms for query by humming , 2003, SIGMOD '03.

[59]  Gianluca Mazzini,et al.  A Framework for Robust Audio Fingerprinting , 2010, J. Commun..

[60]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[61]  G.S. Smith,et al.  A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.

[62]  Eyal de Lara,et al.  Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.

[63]  Marsha Berman,et al.  The directory of tunes and musical themes , 1975 .

[64]  Mario Huemer,et al.  Key Generation Based on Acceleration Data of Shaking Processes , 2007, UbiComp.

[65]  Brian Christopher Smith,et al.  Query by humming: musical information retrieval in an audio database , 1995, MULTIMEDIA '95.