TY - GEN
T1 - Audio-based self-organizing authentication for pervasive computing
T2 - 38th International Conference Parallel Processing Workshops, ICPPW 2009
AU - Kim, Su Jin
AU - Gupta, Sandeep
PY - 2009
Y1 - 2009
N2 - Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the absence of the fixed infrastructure. Thus, existing security solutions do not fit this new computing environment. In many pervasive applications, devices collaborate with others within a particular area (such as a room or a building) and thus such applications need authentication for security. In this paper, we propose a new authentication technique which allows devices to authenticate each other when they are within the same audio region. The main advantage of our scheme is that there is no need of the pre-shared secret, the pre-existing trust relationship and human involvement. This paper takes a cyber-physical approach and generates features from the environmental sound. The idea is that this feature is used to verify the legitimacy of devices. We present the audio-based self-organizing authentication scheme and experimental results showing the achievement of requirements. We also analyze the computation cost, energy cost and security.
AB - Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the absence of the fixed infrastructure. Thus, existing security solutions do not fit this new computing environment. In many pervasive applications, devices collaborate with others within a particular area (such as a room or a building) and thus such applications need authentication for security. In this paper, we propose a new authentication technique which allows devices to authenticate each other when they are within the same audio region. The main advantage of our scheme is that there is no need of the pre-shared secret, the pre-existing trust relationship and human involvement. This paper takes a cyber-physical approach and generates features from the environmental sound. The idea is that this feature is used to verify the legitimacy of devices. We present the audio-based self-organizing authentication scheme and experimental results showing the achievement of requirements. We also analyze the computation cost, energy cost and security.
KW - Authentication
KW - Cyber-physical security solution
KW - Pervasive computing
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=77949507745&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77949507745&partnerID=8YFLogxK
U2 - 10.1109/ICPPW.2009.80
DO - 10.1109/ICPPW.2009.80
M3 - Conference contribution
AN - SCOPUS:77949507745
SN - 9780769538037
T3 - Proceedings of the International Conference on Parallel Processing Workshops
SP - 362
EP - 369
BT - ICPPW 2009 - The 38th International Conference Parallel Processing Workshops
Y2 - 22 September 2009 through 25 September 2009
ER -