Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems

被引:21
|
作者
Mao, Jian [1 ]
Zhu, Shishi [2 ]
Dai, Xuan [1 ]
Lin, Qixiao [1 ]
Liu, Jianwei [1 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Microphones; Smart homes; Acoustics; Speech recognition; Hardware; Feature extraction; Ultrasonic imaging; Inaudible audio attack; Internet of Things (IoT); signal-processing-based detection; smart home; smart speakers;
D O I
10.1109/JIOT.2020.2997779
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things is a critical infrastructure component as well as an enabling technology to support the fast-developing cross-region, cross-application, and diversified collaborative smart city services that require systematic cooperation among multiple smart city systems. Speech recognition-based voice controllable systems become one of the most popular interfaces in smart devices. However, it has been proved that attackers can hide their voice commands via modulating them on ultrasonic carriers and carry out inaudible voice attacks to manipulate voice controllable devices (e.g., mobile phone) unnoticeably. Although there are defense suggestions to enhance the hardware or add new modules of microphones, it is impractical to change the hardware design of all voice-controllable devices developed by different manufactures. In this article, we validate the effectiveness of ultrasonic-based inaudible voice attacks to voice-controllable smart home devices and propose a signal-processing-based hidden voice attack detection approach. Our approach uses an independent device that deploys a two-step lightweight detecting algorithm to identify the attack signals. We simulate our algorithm and make a prototype implementation of the proposed approach. The simulation results illustrate the correctness of the detection algorithm and the experiments show that our approach can detect the ultrasonic-based inaudible voice attack effectively.
引用
收藏
页码:8025 / 8035
页数:11
相关论文
共 50 条
  • [41] A Dynamic Method to Protect User Privacy Against Traffic-based Attacks on Smart Home
    dos Santos, Bruna, V
    Vergutz, Andressa
    Macedo, Ricardo T.
    Nogueira, Michele
    2022 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2022,
  • [42] Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks
    Chi, Haotian
    Fu, Chenglong
    Zeng, Qiang
    Du, Xiaojiang
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 285 - 302
  • [43] A dynamic method to protect user privacy against traffic-based attacks on smart home
    dos Santos, Bruna, V
    Vergutz, Andressa
    Macedo, Ricardo T.
    Nogueira, Michele
    AD HOC NETWORKS, 2023, 149
  • [44] Spoofing Attacks on Speaker Verification Systems Based Generated Voice Using Genetic Algorithm
    Li, Qi
    Zhu, Hui
    Zhang, Ziling
    Lu, Rongxing
    Wang, Fengwei
    Li, Hui
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [45] Design and Evaluation of an AR Voice-based Indoor UAV Assistant for Smart Home Scenarios
    Helmert, Robin
    Hardes, Tobias
    Yigitbas, Enes
    ACM SYMPOSIUM ON SPATIAL USER INTERACTION, SUI 2023, 2023,
  • [46] Jarvis: A Voice-based Context-as-a-Service Mobile Tool for a Smart Home Environment
    Huynh, Ngoc Dung
    Bouadjenek, Mohamed Reda
    Hassani, Ali
    Razzak, Imran
    Lee, Kevin
    Arora, Chetan
    Zaslavsky, Arkady
    Proceedings - IEEE International Conference on Mobile Data Management, 2022, 2022-June : 318 - 321
  • [47] Voice Frequency-Based Gender Classification Using Convolutional Neural Network for Smart Home
    Nasaruddin, Nasaruddin
    Tresma, Muhammad Agung P. Pratama
    Muchamad, Masduki Khamdan
    Fuadi, Zahrul
    IEEE ACCESS, 2024, 12 : 104190 - 104203
  • [48] Jarvis: A Voice-based Context-as-a-Service Mobile Tool for a Smart Home Environment
    Huynh, Ngoc Dung
    Bouadjenek, Mohamed Reda
    Hassani, Ali
    Razzak, Imran
    Lee, Kevin
    Arora, Chetan
    Zaslavsky, Arkady
    2022 23RD IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2022), 2022, : 318 - 321
  • [49] Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game
    Al Sharah, Ashraf
    Oyedare, Taiwo
    Shetty, Sachin
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2016, 2016 (2016)
  • [50] A Model for Detecting False Data Injection Attacks in Smart Grids Based on the Method Utilized for Image Coding
    Pan, Huan
    Feng, Xuelian
    Na, Chunning
    Yang, Hang
    IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 6181 - 6191