邻近回声:使用主动声音感应的安全双因素认证

Yanzhi Ren, Ping Wen, Hongbo Liu, Zhourong Zheng, Yingying Chen, Pengcheng Huang, Hongwei Li
{"title":"邻近回声:使用主动声音感应的安全双因素认证","authors":"Yanzhi Ren, Ping Wen, Hongbo Liu, Zhourong Zheng, Yingying Chen, Pengcheng Huang, Hongwei Li","doi":"10.1109/INFOCOM42981.2021.9488866","DOIUrl":null,"url":null,"abstract":"The two-factor authentication (2FA) has drawn increasingly attention as the mobile devices become more prevalent. For example, the user’s possession of the enrolled phone could be used by the 2FA system as the second proof to protect his/her online accounts. Existing 2FA solutions mainly require some form of user-device interaction, which may severely affect user experience and creates extra burdens to users. In this work, we propose Proximity-Echo, a secure 2FA system utilizing the proximity of a user’s enrolled phone and the login device as the second proof without requiring the user’s interactions or pre-constructed device fingerprints. The basic idea of Proximity-Echo is to derive location signatures based on acoustic beep signals emitted alternately by both devices and sensing the echoes with microphones, and compare the extracted signatures for proximity detection. Given the received beep signal, our system designs a period selection scheme to identify two sound segments accurately: the chirp period is the sound segment propagating directly from the speaker to the microphone whereas the echo period is the sound segment reflected back by surrounding objects. To achieve an accurate proximity detection, we develop a new energy loss compensation extraction scheme by utilizing the extracted chirp periods to estimate the intrinsic differences of energy loss between microphones of the enrolled phone and the login device. Our proximity detection component then conducts the similarity comparison between the identified two echo periods after the energy loss compensation to effectively determine whether the enrolled phone and the login device are in proximity for 2FA. Our experimental results show that our Proximity-Echo is accurate in providing 2FA and robust to both man-in-the-middle (MiM) and co-located attacks across different scenarios and device models.","PeriodicalId":293079,"journal":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing\",\"authors\":\"Yanzhi Ren, Ping Wen, Hongbo Liu, Zhourong Zheng, Yingying Chen, Pengcheng Huang, Hongwei Li\",\"doi\":\"10.1109/INFOCOM42981.2021.9488866\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The two-factor authentication (2FA) has drawn increasingly attention as the mobile devices become more prevalent. For example, the user’s possession of the enrolled phone could be used by the 2FA system as the second proof to protect his/her online accounts. Existing 2FA solutions mainly require some form of user-device interaction, which may severely affect user experience and creates extra burdens to users. In this work, we propose Proximity-Echo, a secure 2FA system utilizing the proximity of a user’s enrolled phone and the login device as the second proof without requiring the user’s interactions or pre-constructed device fingerprints. The basic idea of Proximity-Echo is to derive location signatures based on acoustic beep signals emitted alternately by both devices and sensing the echoes with microphones, and compare the extracted signatures for proximity detection. Given the received beep signal, our system designs a period selection scheme to identify two sound segments accurately: the chirp period is the sound segment propagating directly from the speaker to the microphone whereas the echo period is the sound segment reflected back by surrounding objects. To achieve an accurate proximity detection, we develop a new energy loss compensation extraction scheme by utilizing the extracted chirp periods to estimate the intrinsic differences of energy loss between microphones of the enrolled phone and the login device. Our proximity detection component then conducts the similarity comparison between the identified two echo periods after the energy loss compensation to effectively determine whether the enrolled phone and the login device are in proximity for 2FA. Our experimental results show that our Proximity-Echo is accurate in providing 2FA and robust to both man-in-the-middle (MiM) and co-located attacks across different scenarios and device models.\",\"PeriodicalId\":293079,\"journal\":{\"name\":\"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCOM42981.2021.9488866\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOM42981.2021.9488866","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

随着移动设备的普及,双因素身份验证(2FA)越来越受到人们的关注。例如,用户拥有注册的手机可以被2FA系统用作保护其在线帐户的第二证据。现有的2FA解决方案主要需要某种形式的用户-设备交互,这可能会严重影响用户体验并给用户带来额外的负担。在这项工作中,我们提出了proximity - echo,这是一种安全的2FA系统,利用用户注册的手机和登录设备的接近度作为第二个证明,而不需要用户的交互或预先构建的设备指纹。proximity - echo的基本思想是利用两种设备交替发出的声蜂鸣声信号,通过麦克风感知回声,得出位置特征,并对提取的特征进行比较,进行接近检测。根据接收到的蜂鸣声信号,我们的系统设计了一个周期选择方案来准确识别两个声音段:啁啾周期是直接从扬声器传播到麦克风的声音段,而回声周期是被周围物体反射回来的声音段。为了实现准确的接近检测,我们开发了一种新的能量损失补偿提取方案,利用提取的啁啾周期来估计注册手机和登录设备的麦克风之间的能量损失的内在差异。然后,我们的接近检测组件在能量损失补偿后对识别出的两个回波周期进行相似度比较,以有效地确定所登记的手机和登录设备是否在2FA的接近范围内。我们的实验结果表明,我们的Proximity-Echo在提供2FA方面是准确的,并且对跨不同场景和设备模型的中间人(MiM)和同址攻击都具有鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing
The two-factor authentication (2FA) has drawn increasingly attention as the mobile devices become more prevalent. For example, the user’s possession of the enrolled phone could be used by the 2FA system as the second proof to protect his/her online accounts. Existing 2FA solutions mainly require some form of user-device interaction, which may severely affect user experience and creates extra burdens to users. In this work, we propose Proximity-Echo, a secure 2FA system utilizing the proximity of a user’s enrolled phone and the login device as the second proof without requiring the user’s interactions or pre-constructed device fingerprints. The basic idea of Proximity-Echo is to derive location signatures based on acoustic beep signals emitted alternately by both devices and sensing the echoes with microphones, and compare the extracted signatures for proximity detection. Given the received beep signal, our system designs a period selection scheme to identify two sound segments accurately: the chirp period is the sound segment propagating directly from the speaker to the microphone whereas the echo period is the sound segment reflected back by surrounding objects. To achieve an accurate proximity detection, we develop a new energy loss compensation extraction scheme by utilizing the extracted chirp periods to estimate the intrinsic differences of energy loss between microphones of the enrolled phone and the login device. Our proximity detection component then conducts the similarity comparison between the identified two echo periods after the energy loss compensation to effectively determine whether the enrolled phone and the login device are in proximity for 2FA. Our experimental results show that our Proximity-Echo is accurate in providing 2FA and robust to both man-in-the-middle (MiM) and co-located attacks across different scenarios and device models.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信