[go: up one dir, main page]

CN104363092B - The device authentication based on audio physical fingerprint under the conditions of spacing - Google Patents

The device authentication based on audio physical fingerprint under the conditions of spacing Download PDF

Info

Publication number
CN104363092B
CN104363092B CN201410500058.2A CN201410500058A CN104363092B CN 104363092 B CN104363092 B CN 104363092B CN 201410500058 A CN201410500058 A CN 201410500058A CN 104363092 B CN104363092 B CN 104363092B
Authority
CN
China
Prior art keywords
audio
fingerprint
authentication
physical fingerprint
physical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410500058.2A
Other languages
Chinese (zh)
Other versions
CN104363092A (en
Inventor
陈大江
秦臻
王惟
王惟一
王韬
胡定耀
徐海津
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201410500058.2A priority Critical patent/CN104363092B/en
Publication of CN104363092A publication Critical patent/CN104363092A/en
Application granted granted Critical
Publication of CN104363092B publication Critical patent/CN104363092B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

定距条件下的基于音频物理指纹的设备认证。本发明公开了一种基于无线设备音频硬件(扩音器和麦克风)物理指纹的定距离设备认证协议。该协议在认证双方音频握手以后,首先在发送端产生混频音频信号,同时利用扩音器将混频信号发送给接收端;其次,接收端利用麦克风接收混频信号,并提取物理指纹;最后,接收端利用基于偏离率的指纹匹配算法将收集到的指纹与指纹库中的指纹做匹配分析。本发明设计的认证方法具有高效率,低能耗,操作简单便捷,可移植性高等特点。

Audio-based physical fingerprint-based device authentication under distance conditions. The invention discloses a fixed-distance device authentication protocol based on the physical fingerprint of the audio hardware (speaker and microphone) of the wireless device. After the audio handshake between the two parties is authenticated, the protocol first generates a mixed frequency audio signal at the sending end, and at the same time sends the mixed frequency signal to the receiving end through a loudspeaker; secondly, the receiving end uses a microphone to receive the mixed frequency signal and extracts a physical fingerprint; finally , the receiving end uses the fingerprint matching algorithm based on the deviation rate to match the collected fingerprints with the fingerprints in the fingerprint library. The authentication method designed by the invention has the characteristics of high efficiency, low energy consumption, simple and convenient operation, high portability and the like.

Description

定距条件下的基于音频物理指纹的设备认证Device authentication based on audio physical fingerprint under fixed-distance conditions

技术领域technical field

本发明属于无线安全领域,更为具体地讲,涉及认证距离固定条件下的基于音频硬件物理指纹的设备认证。The invention belongs to the field of wireless security, and more specifically relates to equipment authentication based on audio hardware physical fingerprints under the condition of a fixed authentication distance.

背景技术Background technique

近年来,研究者发现利用无线网络的物理信息可以实现各种认证。该认证方法具有广泛的应用场景,例如信息防伪,基于身份的攻击检测,接入控制,故障检测,以及目标追踪等。根据利用的物理信息的不同,可以将该方法分为:基于软件指纹的认证;基于信道或者位置指纹的认证;基于硬件指纹的认证。In recent years, researchers have found that physical information of wireless networks can be used to achieve various authentications. The authentication method has a wide range of application scenarios, such as information anti-counterfeiting, identity-based attack detection, access control, fault detection, and target tracking. According to the different physical information used, the method can be divided into: authentication based on software fingerprint; authentication based on channel or location fingerprint; authentication based on hardware fingerprint.

基于软件指纹的认证是利用软件或者协议在设备上运行的固有特性进行认证。最常见的是利用IEEE 802.11标准的介质访问控制(MAC)协议进行设备认证。其原理包括:由于该协议庞大而复杂的规范,通常不同的设备制造商和驱动程序开发人员的实现方式有所不同;由于芯片组,固件和设备驱动程序的不同组合,因此,各个设备体现出不同的MAC层的行为。然而,基于软件指纹的缺点包括:不能很好的区分使用相同的软件的不同物理设备;敌手能够通过观察学习到合法用户的行为,并通过改变自身的设备驱动程序模仿合法用户的行为。Authentication based on software fingerprints uses the inherent characteristics of software or protocols running on devices for authentication. The most common is the use of the IEEE 802.11 standard Media Access Control (MAC) protocol for device authentication. The principles include: Due to the large and complex specification of the protocol, different device manufacturers and driver developers usually implement it differently; due to different combinations of chipsets, firmware and device drivers, individual devices reflect behavior of different MAC layers. However, the disadvantages of software-based fingerprinting include: different physical devices that use the same software cannot be well distinguished; the adversary can learn the behavior of legitimate users through observation, and imitate the behavior of legitimate users by changing their own device drivers.

基于无线信道或者位置指纹的认证是通过路径丢失(Path Loss)和信道衰落(Channel Fading)的位置特征来实现的。反应无线信道特征的物理量包括信道情况信息(Channel State Information,CSI)和接收的信号强度(Received Signal Strength,RSS)。其中,CSI是信道特征细粒度的描述,而RSS是信道特征粗粒度的描述。由于在现有硬件下CSI的测量比较困难,故基于CSI的认证方法无法很好的推广。现有无线设备可以很容易的获得RSS值,但由于RSS对信道的描述不够精确,因此容易受到冒充攻击。总之,现有的基于无线信道或者位置指纹的认证协议要么对硬件有特殊的要求,要么具有安全漏洞。The authentication based on the wireless channel or location fingerprint is realized through the location characteristics of path loss (Path Loss) and channel fading (Channel Fading). The physical quantities that reflect the characteristics of the wireless channel include channel state information (Channel State Information, CSI) and received signal strength (Received Signal Strength, RSS). Among them, CSI is a fine-grained description of channel characteristics, and RSS is a coarse-grained description of channel characteristics. Since it is difficult to measure CSI under existing hardware, the authentication method based on CSI cannot be well promoted. Existing wireless devices can easily obtain the RSS value, but because the RSS description of the channel is not accurate enough, it is vulnerable to impersonation attacks. In short, the existing authentication protocols based on wireless channel or location fingerprint either have special requirements for hardware or have security holes.

考虑到音频通信(包括基于音频的近场通信)的日益商业化,并且现有无线设备大都配备有麦克风扬声器等音频硬件,本发明设计了一个在认证距离固定的条件下基于音频硬件物理指纹的设备认证协议。该协议利用无线设备麦克风和扬声器对频率响应的物理不可克隆性,通过提取音频射频麦克风和扬声器对不同频率的频率响应作为物理指纹,该协议可广泛应用于各种带有音频硬件的设备在认证距离固定的条件下的身份认证。Considering the increasing commercialization of audio communication (including audio-based near-field communication), and most existing wireless devices are equipped with audio hardware such as microphones and speakers, the present invention designs an authentication based on the physical fingerprint of audio hardware under the condition that the authentication distance is fixed. Device Authentication Protocol. The protocol takes advantage of the physical unclonability of the frequency response of the wireless device microphone and speaker, and extracts the frequency response of the audio RF microphone and speaker to different frequencies as a physical fingerprint. This protocol can be widely used in various devices with audio hardware in the authentication Identity authentication under the condition of fixed distance.

发明内容Contents of the invention

本发明的目的在于克服现有的基于密码学方法的设备身份认证的安全性问题。同时,消除现有的基于设备物理层指纹的设备身份对硬件的苛刻要求。The purpose of the present invention is to overcome the security problem of the existing device identity authentication based on the cryptographic method. At the same time, it eliminates the strict hardware requirements of the existing device identity based on the physical layer fingerprint of the device.

为了实现上述目的,本发明基于音频硬件物理指纹的定距离设备认证,其特征在于,包括:一个混频音频信号生成与发送模块,用于设备进行学习和认证时音频信号的产生;一个音频设备物理指纹提取模块,用于在接收端对混频信号预处理并提取频域特征;一个音频物理指纹匹配模块,用于在设备认证时对获取的音频指纹与指纹库中的数据进行匹配。In order to achieve the above object, the present invention is based on audio hardware physical fingerprint device authentication at a fixed distance, which is characterized in that it includes: a mixing audio signal generation and sending module, used for the generation of audio signals when the device is learning and authenticating; an audio device A physical fingerprint extraction module is used to preprocess the mixed signal at the receiving end and extract frequency domain features; an audio physical fingerprint matching module is used to match the acquired audio fingerprint with the data in the fingerprint library during device authentication.

附图说明Description of drawings

为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其它的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. For those skilled in the art, other drawings can also be obtained based on these drawings without any creative effort.

图一是本发明的认证流程图;Fig. 1 is the authentication flowchart of the present invention;

图二是本发明中提出的协议框架图。Fig. 2 is a protocol frame diagram proposed in the present invention.

具体实施方式Detailed ways

本发明实施提供了一种基于音频硬件物理指纹的定距离设备身份认证协议。为使得本发明的发明目的、特征、优点能够更加的明显和易懂,下面将结合本发明实施例中的附图,对本发明实施例中的认证方案进行清楚、完整地描述,显然,所描述的实例仅仅是本发明的主要部分并没有涵盖所有细节。The implementation of the present invention provides a fixed-distance device identity authentication protocol based on the physical fingerprint of the audio hardware. In order to make the purpose, features, and advantages of the present invention more obvious and understandable, the authentication scheme in the embodiment of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiment of the present invention. Obviously, the described The examples given are only the main parts of the invention and do not cover all details.

图一是本协议的认证流程图。Figure 1 is the authentication flow chart of this protocol.

该方法认证框架如下所示:认证的发起者Alice(简记A)与认证者Bob(简记为B)首先通过音频握手建立连接;其次,A产生一段音频混频信号,并通过扬声器向B发送;再次,B利用麦克风收到音频信号以后,提取A的音频设备物理指纹;最后,在学习模式下,B将获取的物理指纹与A的ID关联并存储,在认证模式下,B将收集到的指纹与本地存储的A的指纹作匹配,若匹配成功则通过认证,否则,认证失败。The authentication framework of this method is as follows: the initiator of authentication Alice (A for short) and the authenticator Bob (B for short) first establish a connection through an audio handshake; Send; again, after B uses the microphone to receive the audio signal, extract the physical fingerprint of A's audio device; finally, in the learning mode, B associates and stores the acquired physical fingerprint with A's ID, and in the authentication mode, B will collect The obtained fingerprint is matched with the fingerprint of A stored locally. If the match is successful, the authentication is passed; otherwise, the authentication fails.

图二是本协议的协议框架图。其中发送端与接收端执行的步骤如下:Figure 2 is the protocol framework diagram of this agreement. The steps performed by the sender and receiver are as follows:

发送端:(1)建立连接,获取接收端ID;(2)产生混频信号;(3)发送信号。Sending end: (1) Establish a connection and obtain the receiving end ID; (2) Generate a mixed frequency signal; (3) Send a signal.

接收端:(1)建立连接,发送本机ID,获取对方ID;(2)接收信号;(3)对接收的信号进行FFT变换以及对数处理;(4)判断是学习或认证。若是认证,跳转到步骤5,若是学习则保存学习文件;(5)读取指纹库中发送方的指纹数据,计算偏离率;(6)将偏离率与阈值进行比较,判断是否认证成功。Receiver: (1) establish a connection, send the local ID, and obtain the other party's ID; (2) receive the signal; (3) perform FFT transformation and logarithmic processing on the received signal; (4) determine whether it is learning or authentication. If it is authentication, jump to step 5, if it is learning, save the learning file; (5) read the fingerprint data of the sender in the fingerprint database, and calculate the deviation rate; (6) compare the deviation rate with the threshold to determine whether the authentication is successful.

下面对协议中的每个模块实例进行阐述:The following describes each module instance in the protocol:

混频音频信号生成与发送模块:为了排除环境噪声的干扰,提高认证效率,这里采用的信源信号为将4000Hz-20000Hz频段(以ΔHz为步长)的个频率混合在一起,即:Mixed audio signal generation and transmission module: In order to eliminate the interference of environmental noise and improve the certification efficiency, the source signal used here is the 4000Hz-20000Hz frequency band (with ΔHz as the step size) The frequencies are mixed together, namely:

其中Sound(A)为混频信号,sin(βi)为频率为4000+Δ*(i-1)的正弦单频信号,βi=2*π*(4000+Δ*(i-1))*T。值得注意的是,在实际系统中取Δ=400Hz,n=41,发送时长为T=2秒,并且规定在学习模式和认证模式下发送的音量相同。Among them, Sound(A) is a mixed frequency signal, sin(β i ) is a sinusoidal single-frequency signal with a frequency of 4000+Δ*(i-1), β i =2*π*(4000+Δ*(i-1) )*T. It is worth noting that in the actual system, Δ=400Hz, n=41, the transmission duration is T=2 seconds, and it is stipulated that the volume transmitted in the learning mode and the authentication mode is the same.

音频指纹提取与匹配模块:Audio fingerprint extraction and matching module:

1.利用FFT将时域的音频信号转换成频率上的音频信号,并对振幅做20log(·)的数值处理,作为本次获取的音频指纹,简记为:OA=(ξ1,…,ξn)。1. Use FFT to convert the audio signal in the time domain into an audio signal in frequency, and perform 20log(·) numerical processing on the amplitude, as the audio fingerprint obtained this time, abbreviated as: OA = (ξ 1 ,… , ξ n ).

2.在学习模式下,B将该指纹与A的ID相关联,并将指纹样本存入指纹库。2. In the learning mode, B associates the fingerprint with A's ID, and stores the fingerprint sample in the fingerprint database.

3.在认证模式下,B从指纹库中调出与A的ID相关联的指纹样本,该指纹样本记为:O′A=(ξ′1,…,ξ′n),并调用基于偏离率的匹配算法DR-MA,若DR-MA(Γ,Δ,OA,O′A)=1则匹配成功;否则,认证失败。3. In the authentication mode, B calls out the fingerprint sample associated with A’s ID from the fingerprint database, and the fingerprint sample is recorded as: O′ A =(ξ′ 1 ,…,ξ′ n ), and calls rate matching algorithm DR-MA, if DR-MA(Γ,Δ, OA , O'A )=1, the matching is successful; otherwise, the authentication fails.

其中,DR-MA算法如下所示:设定两个阈值Γ和Δ(在实际系统中,取Γ=8,Δ=0.5)。初始化S=0;T=0,对于每一个i(i=L…,n),做如下循环:若|ξii′|≤Γ,则S=S+1;否则,T=T+1;i=i+1;循环结束。最后,计算偏离率:DR(OA,O′A)=T/S。若DR(OA,O′A)≤Δ,则输出1;否则,输出0。Wherein, the DR-MA algorithm is as follows: two thresholds Γ and Δ are set (in an actual system, Γ=8, Δ=0.5). Initialize S=0; T=0, for each i (i=L..., n), do the following cycle: if |ξ ii '|≤Γ, then S=S+1; otherwise, T=T +1; i=i+1; the loop ends. Finally, calculate the deviation rate: DR( OA , O'A )=T/S. If DR(O A , O′ A )≤Δ, output 1; otherwise, output 0.

发明基于音频设备物理指纹的定距离认证具有以下特点:The invention of fixed-distance authentication based on the physical fingerprint of audio equipment has the following characteristics:

1)利用混频技术产生混频音频信号;1) Utilize frequency mixing technology to generate mixed frequency audio signal;

2)音频信号转换为频域信号提取物理指纹;2) Convert audio signal to frequency domain signal to extract physical fingerprint;

3)提出基于偏移量的DR-MA算法3) Propose an offset-based DR-MA algorithm

以上对本发明基于音频物理指纹的设备身份认证进行了详细介绍。本发明中对发明中提出的协议做了具体阐述;基于本发明中提出的认证协议,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他基于音频的设备身份认证方法,都属于本发明保护的范围。The device identity authentication based on the audio physical fingerprint of the present invention has been introduced in detail above. In the present invention, the protocol proposed in the invention is described in detail; based on the authentication protocol proposed in the present invention, all other audio-based device identity authentication methods obtained by those of ordinary skill in the art without creative work are all Belong to the protection scope of the present invention.

Claims (2)

1. a kind of lightweight finger print matching method based on bias ratio, suitable for being amplified under the conditions of set a distance based on audio hardware The device authentication of the physical fingerprint of device and microphone:Two threshold value Γ and Δ are set, and remembers OA=(ξ1,…,ξn) it is mode of learning The physical fingerprint sample of lower acquisition, O 'A=(ξ '1,…,ξ′n) for the physical fingerprint sample under certification mode, initialize S=0, T =0, for each i, i=1 ..., n, following cycle is done, if | ξi-ξ′i|≤Γ, then S=S+1;Otherwise, T=T+1;I=i+ 1;Cycle terminates, and finally, calculates bias ratio DR (OA,O′A)=T/S, if DR (OA,O′A)≤Δ, then export 1;Otherwise, 0 is exported.
2. in the device authentication system of the physical fingerprint based on audio hardware loudspeaker and microphone under the conditions of set a distance, ginseng Number values are respectively Γ=8, Δ=0.5.
CN201410500058.2A 2014-09-25 2014-09-25 The device authentication based on audio physical fingerprint under the conditions of spacing Expired - Fee Related CN104363092B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410500058.2A CN104363092B (en) 2014-09-25 2014-09-25 The device authentication based on audio physical fingerprint under the conditions of spacing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410500058.2A CN104363092B (en) 2014-09-25 2014-09-25 The device authentication based on audio physical fingerprint under the conditions of spacing

Publications (2)

Publication Number Publication Date
CN104363092A CN104363092A (en) 2015-02-18
CN104363092B true CN104363092B (en) 2018-06-19

Family

ID=52530320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410500058.2A Expired - Fee Related CN104363092B (en) 2014-09-25 2014-09-25 The device authentication based on audio physical fingerprint under the conditions of spacing

Country Status (1)

Country Link
CN (1) CN104363092B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107872429A (en) * 2016-09-26 2018-04-03 中国电信股份有限公司 The method and system that identity is examined is realized in VXLAN
CN108510999B (en) * 2018-02-09 2020-07-14 杭州默安科技有限公司 Zero-authority terminal equipment identification method based on audio fingerprints
CN109861991B (en) * 2019-01-11 2020-12-08 浙江大学 A device fingerprint extraction method based on the nonlinear characteristics of microphones

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102263643A (en) * 2011-08-22 2011-11-30 盛乐信息技术(上海)有限公司 Data communication system and method based on voiceprint recognition
CN103886169A (en) * 2012-12-19 2014-06-25 电子科技大学 Link prediction algorithm based on AdaBoost

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8131026B2 (en) * 2004-04-16 2012-03-06 Validity Sensors, Inc. Method and apparatus for fingerprint image reconstruction

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102263643A (en) * 2011-08-22 2011-11-30 盛乐信息技术(上海)有限公司 Data communication system and method based on voiceprint recognition
CN103886169A (en) * 2012-12-19 2014-06-25 电子科技大学 Link prediction algorithm based on AdaBoost

Also Published As

Publication number Publication date
CN104363092A (en) 2015-02-18

Similar Documents

Publication Publication Date Title
Xie et al. GeneWave: Fast authentication and key agreement on commodity mobile devices
Chen et al. S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol
Fomichev et al. Survey and systematization of secure device pairing
Karapanos et al. {Sound-Proof}: Usable {Two-Factor} authentication based on ambient sound
Zhang et al. ${\ssr {PriWhisper}} $: Enabling Keyless Secure Acoustic Communication for Smartphones
Cao et al. Sec-D2D: A secure and lightweight D2D communication system with multiple sensors
Zhou et al. Nauth: Secure face-to-face device authentication via nonlinearity
Lu et al. Free: A fast and robust key extraction mechanism via inaudible acoustic signal
Chen et al. Wireless device authentication using acoustic hardware fingerprints
CN104936251B (en) A kind of security cooperation relay selection method and system based on optimal power allocation
Yi et al. Wearlock: Unlocking your phone via acoustics using smartwatch
Liu et al. SoundID: Securing mobile two-factor authentication via acoustic signals
CN104363092B (en) The device authentication based on audio physical fingerprint under the conditions of spacing
Li et al. Magfingerprint: A magnetic based device fingerprinting in wireless charging
Mei et al. Listen!: Audio-based smart iot device pairing protocol
Ghose et al. ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification
Zhang et al. PriWhisper+: An enhanced acoustic short-range communication system for smartphones
CN104392161B (en) The device authentication based on audio physical fingerprint under the conditions of displacement
Ghose et al. {HELP}:{Helper-Enabled}{In-Band} Device Pairing Resistant Against Signal Cancellation
Bala et al. PHY-based key agreement scheme using audio networking
Sandosh et al. State-of-the-Art of Voice Assistance Technology, Mitigating Replay Attacks: A Comprehensive Discussion
Shang et al. AudioKey: a usable device pairing system using audio signals on smartwatches
Ye et al. Easy peasy: A new handy method for pairing multiple cots IoT devices
Li et al. The power of whispering: Near field assertions via acoustic communications
Ren et al. Secure mobile two-factor authentication leveraging active sound sensing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180619

Termination date: 20180925

CF01 Termination of patent right due to non-payment of annual fee