NAuth: Secure Face-to-Face Device Authentication via Nonlinearity

被引:0
|
作者
Zhou, Xinyan [1 ,2 ]
Ji, Xiaoyu [1 ,2 ]
Yan, Chen [1 ]
Deng, Jiangyi [1 ]
Xu, Wenyuan [1 ,2 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, USSLab, Hangzhou, Zhejiang, Peoples R China
[2] Alibaba Zhejiang Univ Joint Inst Frontier Technol, Hangzhou, Zhejiang, Peoples R China
关键词
D O I
10.1109/infocom.2019.8737572
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing prevalence of mobile devices, face-to-face device-to-device (D2D) communication has been applied to a variety of daily scenarios such as mobile payment and short distance file transfer. In D2D communications, a critical security problem is verifying the legitimacy of devices when they share no secrets in advance. Previous research addressed the problem with device authentication and pairing schemes based on user intervention or exploiting physical properties of the radio or acoustic channels. However, a remaining challenge is to secure face-to-face D2D communication even in the middle of a crowd, within which an attacker may hide. In this paper, we present NAuth, a nonlinearity-enhanced, location-sensitive authentication mechanism for such communication. Especially, we target at the secure authentication within a limited range such as 20 cm, which is the common case for face-to-face scenarios. NAuth contains a verOcation scheme based on the nonlinear distortion of speaker-microphone systems and a location-based validation model. The verification scheme guarantees device authentication consistency by extracting acoustic nonlinearity patterns (ANY) while the validation model ensures device legitimacy by measuring the time difference of arrival (TDOA) at two microphones. We analyze the security of NAuth theoretically and evaluate its performance experimentally. Results show that NAuth can verify the device legitimacy in the presence of nearby attackers.
引用
收藏
页码:2080 / 2088
页数:9
相关论文
共 50 条
  • [1] A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices
    Ji, Xiaoyu
    Zhou, Xinyan
    Yan, Chen
    Deng, Jiangyi
    Xu, Wenyuan
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (04) : 1155 - 1171
  • [2] Secure authentication for face recognition
    Dabbah, M. A.
    Woo, W. L.
    Dlay, S. S.
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN IMAGE AND SIGNAL PROCESSING, 2007, : 121 - 126
  • [3] SAFE: Secure Authentication with Face and Eyes
    Boehm, Arman
    Chen, Dongqu
    Frank, Mario
    Huang, Ling
    Kuo, Cynthia
    Lolic, Tihomir
    Martinovic, Ivan
    Song, Dawn
    [J]. 2013 INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS), 2013,
  • [4] FACE-TO-FACE
    DAVIS, AW
    [J]. BYTE, 1995, 20 (10): : 69 - 72
  • [5] FACE-TO-FACE
    LARRABEE, WF
    [J]. ARCHIVES OF OTOLARYNGOLOGY-HEAD & NECK SURGERY, 1994, 120 (07) : 774 - 775
  • [6] Face-to-Face
    Mahfouz, Naguib
    [J]. MASSACHUSETTS REVIEW, 2019, 60 (02): : 280 - 287
  • [7] Face-to-face
    Elkrief, Ruth
    Blum, Leon
    [J]. HISTORIA, 2024, (931): : 122 - 125
  • [8] Face-to-face
    Simeonova, Neda
    [J]. Water and Wastes Digest, 2007, 47 (11):
  • [9] FACE-TO-FACE
    Chandrasekar, Hareesh
    [J]. RESONANCE-JOURNAL OF SCIENCE EDUCATION, 2013, 18 (06): : 567 - 580
  • [10] A face-to-face
    Ndiaye, Marie
    [J]. NOUVELLE REVUE FRANCAISE, 2009, (588): : 359 - 361