AdhocPairing: Spontaneous audio based secure device pairing for Android mobile devices

نویسندگان

  • Stephan Sigg
  • Yusheng Ji
  • Ngu Nguyen
چکیده

We present an implementation of AdhocPairing, an audiobased secure pairing application for Android mobile devices. The application implements recent advances in audio-based pairing utilising Fuzzy cryptography. In particular, it generates audio fingerprints from ambient audio of weakly synchronised devices and extracts identical, arbitrary length secure binary keys. Synchronisation in audio samples is achieved by approximative pattern matching without interdevice communication. Additionally, we present results from a case study with android mobile phones and data on the entropy of recorded fingerprints.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Automated Device Pairing for Asymmetric Pairing Scenarios

“Secure Device Pairing” is the process of bootstrapping secure communication between two human-operated devices over a shortor medium-range wireless channel (such as Bluetooth, WiFi). The devices in such a scenario can neither be assumed to have a prior context with each other nor do they share a common trusted authority. However, the devices can generally be connected using auxiliary physical ...

متن کامل

Improving Mobile Device Security with Operating System-Level Virtualization

In this paper, we propose a lightweight mechanism to isolate one or more Android userland instances from a trustworthy and secure entity. This entity controls and manages the Android instances and provides an interface for remote administration and management of the device and its software. Our approach includes several security extensions for secure network access, integrity protection of data...

متن کامل

Secure Computation on Mobile Devices

Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the researc...

متن کامل

CrowdShare: Secure Mobile Resource Sharing

Mobile smart devices and services have become an integral part of our daily life. In this context there are many compelling scenarios for mobile device users to share resources. A popular example is tethering. However, resource sharing also raises privacy and security concerns. In this paper, we present CrowdShare, a complete framework and its (Android) implementation for secure and private res...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012