Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication

被引:0
|
作者
Yunxi Guo
Akhilesh Tyagi
机构
[1] Electrical & Computer Engineering Iowa State University,
关键词
Physical unclonable functions; Mobile authentication; Speech processing;
D O I
10.1007/s41635-017-0003-4
中图分类号
学科分类号
摘要
In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests.
引用
收藏
页码:18 / 37
页数:19
相关论文
共 50 条
  • [1] Voice Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Guo, Yunxi
    Tyagi, Akhilesh
    [J]. 2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 512 - 517
  • [2] UDhashing: Physical Unclonable Function-Based User-Device Hash for Endpoint Authentication
    Zheng, Yue
    Cao, Yuan
    Chang, Chip-Hong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019, 66 (12) : 9559 - 9570
  • [3] Device Authentication by Physical Unclonable Functions
    Mugali, Kavita Chandrakant
    Patil, Minakshee M.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 327 - 329
  • [4] Facial Biohashing Based User-Device Physical Unclonable Function for Bring Your Own Device Security
    Zheng, Yue
    Cao, Yuan
    Chang, Chip-Hong
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [5] Physical unclonable functions for device authentication and secret key generation
    Suh, G. Edward
    Devadas, Srinivas
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 9 - +
  • [6] Practical and Secure IoT Device Authentication using Physical Unclonable Functions
    Wallrabenstein, John Ross
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 99 - 106
  • [7] User-Device Authentication in Mobile Banking using APHEN for Paratuck2 Tensor Decomposition
    Charlier, Jeremy
    Falk, Eric
    State, Radu
    Hilger, Jean
    [J]. 2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 886 - 894
  • [8] User Authentication via PRNU-Based Physical Unclonable Functions
    Valsesia, Diego
    Coluccia, Giulio
    Bianchi, Tiziano
    Magli, Enrico
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1941 - 1956
  • [9] Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems
    Timon Lopez, Cristina
    Alamillo Domingo, Ignacio Alamillo
    Valero Torrijos, Julian Valero
    [J]. ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [10] Medical device design in context: A model of user-device interaction and consequences
    Sharples, Sarah
    Martin, Jennifer
    Lang, Alexandra
    Craven, Michael
    O'Neill, Sonja
    Barnett, Julie
    [J]. DISPLAYS, 2012, 33 (4-5) : 221 - 232