Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.2.327

Authentication of a smart phone user using audio frequency analysis  

Kim, Jin-Bok (School of Computer and Information Engineering, Inha University)
Song, Jeong-Eun (School of Computer and Information Engineering, Inha University)
Lee, Mun-Kyu (School of Computer and Information Engineering, Inha University)
Abstract
In this paper, we propose user authentication methods using a microphone and a speaker in smart phones. The proposed methods guarantee that the user is located close to the target device by transmitting the challenge via an audio channel. We propose two authentication methods; user authentication for a PC or a website using a smart phone as a hardware token, and user authentication to log on to a smart phone using a PC as a token. Because our methods use typical peripheral devices such as a microphone and a speaker, they do not require any special-purpose hardware equipment. In addition, the elderly and the handicapped can easily use our methods because the methods are activated by simple operations.
Keywords
user authentication; audio frequency analysis; smart phone;
Citations & Related Records
연도 인용수 순위
  • Reference
1 방송통신위원회 보도자료, http://www.kcc.go.kr/user.do?mode=view&page=P050 30000&dc=K05030000&boardId=1042 &boardSeq=30991, 2011년 3월.
2 2011년 상반기 스마트폰 이용실태조사, http: //isis.kisa.or.kr/board/index.jsp?pageI d=040100&bbsId=7&itemId=776&pag eIndex=1, 2011년 7월.
3 디지털타임즈 보도자료, http://www.dt.co.kr /contents.htm?article_no=20110609020 11831699001, 2011년 6월.
4 Fred Cheng, "A secure mobile OTP Token", Mobilware 2010, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 48, pp.3-16, July, 2010.
5 Mun-Kyu Lee, Bo Kyoung Ku, and Jin Bok Kim, "Easy Authentication Using Sm art Phones and 2-D Barcodes", ICCE 2011, pp. 139-140, January, 2011.
6 A. J. Nicholson, M. D. Corner and B. D. Noble, "Mobile device security using transient authentication," IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp.1489-1502, Nov, 2006.   DOI
7 R. Want, A. Hopper, V. Falcao and J. Gibbons, "The Active Badge Location System," ACM Transactions on Information Systems, vol. 10, no.1, pp.91-102, Jan, 1992.   DOI
8 P. Bahl and V. N. Padmanabhan, "RADAR: An In-Building RF-Based User Location and Tracking System," INFOCOM 2000, 2, pp.775-784, March, 2000.
9 윤민, 한태윤, 이문규, "간섭에 내성을 지닌 초음파 기반 사용자 인증 프로토콜", 차세대컴퓨팅학회논문지, 5(3), pp.20-28, 2009년 9월.
10 M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik and E. Uzun, "Loud and Clear: Human-Verifiable Authentication Based on Audio," ICDCS 2006, pp. 10-10, July, 2006.
11 H. Bojinov and D. Boneh, "Mobile Token- Based Authentication on a Budget," ACM HotMobile 2011, March, 2011.
12 김정태, "소음이 인체에 미치는 영향 (I) 청감의 신비", 한국소음진동학회(소음진동), 2(4), pp. 243-252, 1992년 10월.
13 Cooley-Tukey FFT algorithm, Wikipedia the free encyclopedia, http://en.wikipedia. org/wiki/Cooley-Tukey_FFT_algorit hm