Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication

被引:0
|
作者
Yunxi Guo
Akhilesh Tyagi
机构
[1] Electrical & Computer Engineering Iowa State University,
关键词
Physical unclonable functions; Mobile authentication; Speech processing;
D O I
10.1007/s41635-017-0003-4
中图分类号
学科分类号
摘要
In this paper, a novel voice-based User-Device (UD-) physical unclonable function (PUF) is demonstrated. In traditional PUFs, variability of challenge-response pairs (CRPs) only comes from physical randomness of silicon. Recently, a new type of PUF, touch screen-based UD-PUF was proposed, which entangles human user biometric variability with the silicon variability. Any silicon-based mobile device sensor which is a UI element can potentially seed such a UD-PUF. Having multiple orthogonal sensor space UD-PUFs helps robustness. If one UD-PUF behaves poorly in certain environmental conditions, another one might behave well. In voice UD-PUF, challenges are single words chosen by the user. The user speaks the challenge word into the microphone of the mobile device. The speech has natural human biometric variability. Raw microphone output data of analog to digital converter (ADC) also reflects the silicon variability. This voice microphone data sequence can be quantized into a binary sequence leading to a PUF—a physical randomness derived, unclonable function. To ensure reproducibility, a background noise reduction algorithm, a statistical error correction, and a frequency domain canonical representation are utilized. Both variability and reproducibility of this voice UD-PUF are evaluated. Several authentication algorithms are proposed in this paper. Pixel-matching authentication algorithm provides an average 15.33% false positive rate and an average 12.30% false negative rate while frame-count authentication algorithm provides an average 6.27% false positive rate and an average 13.23% false negative rate. For variability, we show 250+ bits Hamming distance, on average, between 512 bits binary responses of different (user, device, challenge) combinations. We also assess the pseudorandom number generation properties of voice UD-PUF by putting its binary responses through UMontreal TESTU01 suite of tests. The best voice UD-PUF algorithm passed all 26 randomness tests.
引用
下载
收藏
页码:18 / 37
页数:19
相关论文
共 50 条
  • [41] Tapped-based Authentication for Mobile Device Security
    Brodowski, Lukasz
    Dziurgot, Cameron
    Moretz, Donald
    PROCEEDINGS OF THE 2017 ACM SIGCSE TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION (SIGCSE'17), 2017, : 751 - 752
  • [42] Authentication of Optical Physical Unclonable Functions Based on Single-Pixel Detection
    Wang, Pidong
    Chen, Feiliang
    Li, Dong
    Sun, Song
    Huang, Feng
    Zhang, Taiping
    Li, Qian
    Chen, Kun
    Wan, Yongbiao
    Leng, Xiao
    Yao, Yao
    PHYSICAL REVIEW APPLIED, 2021, 16 (05)
  • [43] Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption
    Trewin, Shari
    Swart, Cal
    Koved, Larry
    Martino, Jacquelyn
    Singh, Kapil
    Ben-David, Shay
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 159 - 168
  • [44] Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes
    Lee, Hakjun
    Ryu, Jihyeon
    IEEE Access, 2024, 12 : 172483 - 172498
  • [45] Photonic Physical Unclonable Functions: From the Concept to Fully Functional Device Operating in the Field
    Akriotou, M.
    Fragkos, A.
    Syvridis, D.
    PHYSICS AND SIMULATION OF OPTOELECTRONIC DEVICES XXVIII, 2020, 11274
  • [46] Approach for Protecting Mobile Device User's Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 886 - 893
  • [47] Biornetric authentication for a mobile personal device
    Tao, Qian
    Veldbuis, Raymond N. J.
    2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 222 - +
  • [48] Adversary Models for Mobile Device Authentication
    Mayrhofer, Rene
    Sigg, Stephan
    ACM COMPUTING SURVEYS, 2022, 54 (09)
  • [49] Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
    N. N. Shenets
    Automatic Control and Computer Sciences, 2023, 57 : 886 - 893
  • [50] A framework of dynamic selection method for user classification in touch-based continuous mobile device authentication
    Zaidi, Ahmad Zairi
    Chong, Chun Yong
    Parthiban, Rajendran
    Sadiq, Ali Safaa
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67