43rd Annual 2009 International Carnahan Conference on Security Technology 2009
DOI: 10.1109/ccst.2009.5335562
|View full text |Cite
|
Sign up to set email alerts
|

Secure device pairing using audio

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Like radio signals, audio signals also attenuate over distance. Claycomb and Shin [2009] presented "UbiSound," a technique that exploits this for exchange of authentication data over audio, where devices have to be within close proximity to "hear" the data reliably.…”
Section: Proximitymentioning
confidence: 99%
See 1 more Smart Citation
“…Like radio signals, audio signals also attenuate over distance. Claycomb and Shin [2009] presented "UbiSound," a technique that exploits this for exchange of authentication data over audio, where devices have to be within close proximity to "hear" the data reliably.…”
Section: Proximitymentioning
confidence: 99%
“…Similarly, people perceive fingerprint biometrics as robust, because they are used as evidence in law enforcement [Coventry et al 2003]. However, iris verification-using the complex visual texture of the iris for distinctive identification-is in fact one of the most reliable types of biometrics [Coventry 2005].…”
Section: Biometricmentioning
confidence: 99%
“…In Amigo [17], Wi-Fi radio signal strengths were compared across multiple devices to determine if two devices are in proximity of one another. In Ubisound, devices securely paired with one another when they determined that they were hearing the same audio [3]. Lastly, in [4], imagery from multiple back facing cameras were combined to determine 1) if two devices are looking at the same physical area, and 2) the relative The Powers of Co-location CSCW 2015, March 14-18, 2015, Vancouver, BC, Canada orientation of these devices, and this information was used to opportunistically group devices and share information.…”
Section: Related Workmentioning
confidence: 99%
“…Such form of authentication proposes authenticated information exchange between mobile devices using several methods different than the standard RF channel [26]. These are called out-of-band, side-channels or location-limited channels (LLCs) [28], and include audio, visual, infrared, ultrasound, and other forms of transmission [7,23,24,27]. Such techniques allow the receiver to physically verify the source of the transmission.…”
Section: Authentication Definitionmentioning
confidence: 99%