Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning
Abstract
:1. Introduction
2. Related Work
3. Research Background
3.1. Usability
- Dinner party: Social gathering with friends and family, with a money transfer to a friend. The authentication was performed using Alexa 4-digit PIN;
- Utility bill payment: Utility bill payment by voice while watching TV. The authentication was performed using Alexa 4-digit PIN;
- Smart door unlocking: Unlock the front door with hands full of groceries using the voice command. The authentication was performed using Alexa 4-digit PIN;
- Check if a bill has already been paid: Check if a specific bill has already been paid by voice, while the hands are dirty after working in the garden. A variation of this scenario is to have hands dirty by preparing food in the kitchen.
3.2. Privacy
- The purpose limitation means that data controllers should only use the collected data for specific purposes. These purposes should be explicit and determined at the time of the personal data collection;
- The data minimization principle refers to personal data being adequate, relevant, and limited to what is necessary considering the purposes for which they are processed (i.e., data controllers are only allowed to collect personal data that is necessary to fulfill the specific purpose);
- The transparency principle states that the processing of personal data should be transparent to the data subject, who must be knowledgeable about their rights and have the means to exercise it. Natural persons should be aware of the risks, rules, and rights in relation to the processing of personal data;
- The accountability principle refers to the controller being able to demonstrate compliance with the privacy principles.
3.3. Security
4. Proposed Non-Invasive Scheme
4.1. Design Goals
- The mechanism must provide mutual authentication;
- The novel authentication mechanism must have at least the same security level as the existing invasive authentication mechanism (i.e., smartphone token in internet banking (IB));
- The authentication mechanism must have a comparable response time with the state-of-the-art schemes found in the literature;
- The mechanism must be a non-invasive procedure. It should provide an acceptable security level, while maintaining the usability of the voice user interface (VUI).
4.2. Threat Model
- Adversary’s Goal: The adversary wishes to reduce the legitimate user’s balance; Adversary’s Knowledge: The adversary has access to some data samples from previous financial transactions voice commands collected from a nearby compromised speaker device (e.g., personal computer or smart TV);
- Adversary’s Capability: The adversary can control the compromised nearby speaker device to play a previous voice command or an altered voice command whenever convenient. The random number used in the authentication can not be guessed by the attacker;
- Adversary’s Limitation: The inter-app communication in the mobile device is considered secure (i.e., the adversary can not get the shared key in the mobile device by collusion attack [44]), as we rely in the mobile operating system security. The adversary does not have the resources to perform a massive attack to the bank server and compromise the shared keys in the bank’s possession. The trusted IoT device is considered secure, and we consider that the adversary can not steal it from the legitimate owner in the trusted location. Internal attacks to the voice user interface, such as phishing, are out of the scope of this study.
4.3. Assumptions and Hypotheses
4.4. Architecture
4.5. Enrollment
4.6. Continuous Authentication
5. Challenge–Response Protocol
5.1. Protocol Description
- TM—trusted mobile;
- BS—bank server;
- rBS—random number generated by BS;
- rTM—random number generated by TM;
- bs—BS identifier;
- tm—TM identifier;
- K1—the shared key between TM and BS;
- hK1()—hash function with shared key K1;
- “,” denotes concatenation;
- TIoTD—trusted IoT device;
- rTIoTD—the random number generated by TIoTD;
- tIoTd—TIoTD identifier;
- K3—the shared key between TM and BS;
- hK3()—hash function with shared key K3.
- M1: TM ← BS: hK3(hK1(rBS,tIoTd))
- M2: TIoTD ← TM: hK1(rBS,tIoTd)
- M3: TIoTD → TM: hK2(hK1(rTIoTD,rBS,bs))
- M4: TM → BS: hK1(rTIoTD,rBS,bs)
- M5: TM ← BS: hK1(rTIoTD,rBS,tIoTd)
- M6: TIoTD ← TM: hK2(hK1(rTIoTD,rBS,tIoTd))
5.2. Formal Security Analysis
6. Trusted IoT Device
6.1. Methods and Materials
6.2. Tests and Implementation
- Correct shared keys;
- Correct shared key K1, correct shared key K2, and wrong shared key K3;
- Correct shared key K1, wrong shared key K2, and correct shared key K3;
- Wrong shared key K1, correct shared key K2, and correct shared key K3.
6.3. Performance Analysis
7. Continuous Authentication
7.1. Considered Scenarios
7.2. Testbed Data Collection
7.3. Proof of Concept
8. Discussion
8.1. Assumptions and Hypotheses
8.2. Known Limitations
8.3. Comparison with Related Work
9. Final Considerations
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Acknowledgments
Conflicts of Interest
References
- Nandy, T.; Idris, M.Y.I.B.; Md Noor, R.; Mat Kiah, L.; Lun, L.S.; Annuar Juma’at, N.B.; Ahmedy, I.; Abdul Ghani, N.; Bhattacharyya, S. Review on Security of Internet of Things Authentication Mechanism. IEEE Access 2019, 7, 151054–151089. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Kavianpour, S.; Shanmugam, B.; Azam, S.; Zamani, M.; Narayana Samy, G.; De Boer, F. A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices. J. Comput. Netw. Commun. 2019, 2019, 5747136. [Google Scholar] [CrossRef] [Green Version]
- Heartfield, R.; Loukas, G.; Budimir, S.; Bezemskij, A.; Fontaine, J.R.; Filippoupolitis, A.; Roesch, E. A taxonomy of cyber-physical threats and impact in the smart home. Comput. Secur. 2018, 78, 398–428. [Google Scholar] [CrossRef] [Green Version]
- Babaei, A.; Schiele, G. Physical unclonable functions in the internet of things: State of the art and open challenges. Sensors 2019, 19, 3208. [Google Scholar] [CrossRef] [Green Version]
- Bani-Hani, A.; Majdalweieh, M.; AlShamsi, A. Online authentication methods used in banks and attacks against these methods. Procedia Comput. Sci. 2019, 151, 1052–1059. [Google Scholar] [CrossRef]
- Sahidullah, M.; Delgado, H.; Todisco, M.; Kinnunen, T.; Evans, N.; Yamagishi, J.; Lee, K.A. Introduction to Voice Presentation Attack Detection and Recent Advances; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Zhang, G.; Yan, C.; Ji, X.; Zhang, T.; Zhang, T.; Xu, W. DolphinAttack: Inaudible voice commands. In Proceedings of the ACM Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 103–117. [Google Scholar] [CrossRef] [Green Version]
- Gong, Y.; Poellabauer, C. Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues. In Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018. [Google Scholar] [CrossRef] [Green Version]
- Wang, C.; Wang, Y.; Chen, Y.; Liu, H.; Liu, J. User authentication on mobile devices: Approaches, threats and trends. Comput. Netw. 2020, 170, 107118. [Google Scholar] [CrossRef]
- Hosseini, S.S.; Mohammadi, S. Review Banking on Biometric in the World’s Banks and Introducing a Biometric Model for Iran’s Banking System. J. Basic. Appl. Sci. Res 2012, 2, 9152–9160. [Google Scholar]
- Spolaor, R.; Li, Q.; Monaro, M.; Conti, M.; Gamberini, L.; Sartori, G. Biometric Authentication Methods on Smartphones: A Survey. PsychNol. J. 2016, 14, 87–98. [Google Scholar]
- Sen, B. VoiceSens. Available online: https://github.com/bedangSen/VoiceSens (accessed on 11 December 2021).
- Larcher, A.; Bonastre, J.F.; Fauve, B.; Aik Lee, K.; Levy, C.; Li, H.; Mason, J.; Parfait, J.Y.; Bonastre, J.F.; Fauve, B.; et al. ALIZE 3.0-Open Source Toolkit for State-of-the-Art Speaker Recognition. In Proceedings of the Annual Conference of the International Speech Communication Association, Lyon, France, 25–29 August 2013. [Google Scholar]
- Barbosa, F.G.; Silva, W.L.S. Support vector machines, Mel-Frequency Cepstral Coefficients and the Discrete Cosine Transform applied on voice based biometric authentication. In Proceedings of the IntelliSys 2015—Proceedings of 2015 SAI Intelligent Systems Conference, London, UK, 10–11 November 2015; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2015; pp. 1032–1039. [Google Scholar] [CrossRef]
- Boles, A.; Rad, P. Voice biometrics: Deep learning-based voiceprint authentication system. In Proceedings of the 2017 12th System of Systems Engineering Conference, SoSE 2017, Waikoloa, HI, USA, 18–21 June 2017; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2017. [Google Scholar] [CrossRef]
- Microsoft. Microsoft Speaker Recognition Overview; Microsoft: Redmond, WA, USA, 2021. [Google Scholar]
- Gartner. Gartner Market Guide for Identity Proofing and Affirmation; Technical Report; Gartner: Stamford, CT, USA, 2020. [Google Scholar]
- Amazon. Require a Voice Code for Purchases with Alexa; Amazon: Seattle, WA, USA, 2021. [Google Scholar]
- Ponticello, A. Towards Secure and Usable Authentication for Voice-Controlled Smart Home Assistants. Ph.D. Thesis, Technische Universität Wien, Vienna, Austria, 2020. [Google Scholar]
- Wang, Q.; Lin, X.; Zhou, M.; Chen, Y.; Wang, C.; Li, Q.; Luo, X. VoicePop: A Pop Noise Based Anti-Spoofing System for Voice Authentication on Smartphones. In Proceedings of the IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019. [Google Scholar]
- Blue, L.; Abdullah, H.; Vargas, L.; Traynor, P. 2MA. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Korea, 4 June 2018; ACM: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
- Lei, X.; Tu, G.H.; Liu, A.X.; Li, C.Y.; Xie, T. The insecurity of home digital voice assistants—Vulnerabilities, attacks and countermeasures. In Proceedings of the 2018 IEEE Conference on Communications and Network Security, Beijing, China, 30 May–1 June 2018; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2018. [Google Scholar] [CrossRef]
- Shahzad, M.; Singh, M.P. Natural Web Interfaces Continuous Authentication and Authorization for the Internet of Things. IEEE Internet Comput. 2017, 21, 86–90. [Google Scholar] [CrossRef]
- Shi, C.; Liu, J.; Liu, H.; Chen, Y. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-Enabled IoT; Association for Computing Machinery (ACM): New York, NY, USA, 2017; pp. 1–10. [Google Scholar] [CrossRef]
- Das, A.K.; Kalam, S.; Sahar, N.; Sinha, D. UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices. Comput. Secur. 2020, 97, 101938. [Google Scholar] [CrossRef]
- Gao, Y.; Wang, W.; Phoha, V.V.; Sun, W.; Jin, Z. EarEcho: Using Ear Canal Echo for Wearable Authentication. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2019, 3, 81. [Google Scholar] [CrossRef]
- Mokhtari, G.; Anvari-Moghaddam, A.; Zhang, Q.; Karunanithi, M. Multi-residential activity labelling in smart homes with wearable tags using BLE technology. Sensors 2018, 18, 908. [Google Scholar] [CrossRef] [Green Version]
- Nespoli, P.; Zago, M.; Celdrán, A.H.; Pérez, M.G.; Mármol, F.G.; Clemente, F.J. PALOT: Profiling and authenticating users leveraging internet of things. Sensors 2019, 19, 2832. [Google Scholar] [CrossRef] [Green Version]
- Pradhan, S.; Sun, W.; Baig, G.; Qiu, L. Combating Replay Attacks Against Voice Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2019, 3, 1–26. [Google Scholar] [CrossRef]
- Meng, Y.; Zhang, W.; Zhu, H.; Shen, X.S. Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures. IEEE Wirel. Commun. 2018, 25, 53–59. [Google Scholar] [CrossRef]
- Feng, H.; Fawaz, K.; Shin, K.G. Continuous authentication for voice assistants. In Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, Snowbird, UT, USA, 16–20 October 2017; Association for Computing Machinery: New York, NY, USA, 2017; Volume Part F131210, pp. 343–355. [Google Scholar] [CrossRef] [Green Version]
- Grassi, P.A.; Fenton, J.L.; Newton, E.M.; Perlner, R.A.; Regenscheid, A.R.; Burr, W.E.; Richer, J.P.; Lefkovitz, N.B.; Danker, J.M.; Choong, Y.Y.; et al. NIST Special Publication 800-63b: Digital Identity Guidelines; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2017. [Google Scholar]
- De Luca, A.; Lindqvist, J. Is secure and usable smartphone authentication asking too much? Computer 2015, 48, 64–68. [Google Scholar] [CrossRef]
- Alepis, E.; Patsakis, C. Monkey Says, Monkey Does: Security and Privacy on Voice Assistants. IEEE Access 2017, 5, 17841–17851. [Google Scholar] [CrossRef]
- Kounoudes, A.D.; Kapitsaki, G.M. A mapping of IoT user-centric privacy preserving approaches to the GDPR. Internet Things 2020, 11, 100179. [Google Scholar] [CrossRef]
- Mazurek, M.L.; Arsenault, J.P.; Bresee, J.; Gupta, N.; Ion, I.; Johns, C.; Lee, D.; Liang, Y.; Olsen, J.; Salmon, B.; et al. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, GA, USA, 10–15 April 2010. [Google Scholar]
- Malkin, N.; Deatrick, J.; Tong, A.; Wijesekera, P.; Egelman, S.; Wagner, D. Privacy Attitudes of Smart Speaker Users. Proc. Priv. Enhancing Technol. 2019, 2019, 250–271. [Google Scholar] [CrossRef] [Green Version]
- Gürses, S.; Troncoso, C.; Diaz, C. Engineering Privacy by Design. Comput. Priv. Data Prot. 2011, 14, 25. [Google Scholar]
- Pinheiro, P.P. Proteção de Dados Pessoais: Comentários à Lei n. 13.709/2018-LGPD; Saraiva Educação SA: São Paulo, SP, Brazil, 2020. [Google Scholar]
- Aleksanjan, A. Data Protection in the Age of Virtual Personal Assistants. Ph.D. Thesis, Ghent University, Ghent, Belgium, 2019. [Google Scholar]
- Cheng, L.; Wilson, C.; Liao, S.; Young, J.; Dong, D.; Hu, H. Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms. In Proceedings of the ACM Conference on Computer and Communications Security, Virtual Event, USA, 9–13 November 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1699–1716. [Google Scholar] [CrossRef]
- Wiggers, K. VentureBeat: Smart Speakers Are Vulnerable to a Variety of Attacks; VentureBeat: San Francisco, CA, USA, 2018. [Google Scholar]
- Elish, K.O.; Cai, H.; Barton, D.; Yao, D.; Ryder, B.G. Identifying mobile inter-app communication risks. IEEE Trans. Mob. Comput. 2020, 19, 90–102. [Google Scholar] [CrossRef]
- Sugawara, T.; Cyr, B.; Rampazzi, S.; Genkin, D.; Fu, K. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems; USENIX: Berkeley, CA, USA, 2020. [Google Scholar]
- Yuan, X.; Chen, Y.; Zhao, Y.; Long, Y.; Liu, X.; Chen, K.; Zhang, S.; Huang, H.; Wang, X.; Gunter, C.A. Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition. In Proceedings of the 27th USENIX Conference on Security Symposium, Baltimore, MD, USA, 15–17 August 2018; SEC’18; USENIX Association: Berkeley, CA, USA, 2018; pp. 49–64. [Google Scholar]
- Mocrii, D.; Chen, Y.; Musilek, P. IoT-based smart homes: A review of system architecture, software, communications, privacy and security. Internet Things 2018, 1–2, 81–98. [Google Scholar] [CrossRef]
- Ashibani, Y.; Kauling, D.; Mahmoud, Q. Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes. Appl. Syst. Innov. 2019, 2, 4. [Google Scholar] [CrossRef] [Green Version]
- Jang, I.; Lee, D.; Choi, J.; Son, Y. An approach to share self-taught knowledge between home IoT devices at the edge. Sensors 2019, 19, 833. [Google Scholar] [CrossRef] [Green Version]
- Preuveneers, D.; Tsingenopoulos, I.; Joosen, W. Resource usage and performance trade-offs for machine learning models in smart environments. Sensors 2020, 20, 1176. [Google Scholar] [CrossRef] [Green Version]
- Turkanović, M.; Brumen, B.; Hölbl, M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 2014, 20, 96–112. [Google Scholar] [CrossRef]
- Aman, M.N.; Basheer, M.H.; Sikdar, B. Two-factor authentication for IoT with location information. IEEE Internet Things J. 2019, 6, 3335–3351. [Google Scholar] [CrossRef]
- Gope, P.; Sikdar, B. Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices. IEEE Internet Things J. 2018, 6, 580–589. [Google Scholar] [CrossRef]
- Ning, H.; Farha, F.; Ullah, A.; Mao, L. Physical unclonable function: Architectures, applications and challenges for dependable security. IET Circuits Devices Syst. 2020, 14, 407–424. [Google Scholar] [CrossRef]
- Wortman, P.; Yan, W.; Chandy, J.; Tehranipoor, F. P2M-based security model: Security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices. IET Comput. Digit. Tech. 2018, 12, 289–296. [Google Scholar] [CrossRef]
- Huang, Z.; Wang, Q. A PUF-based unified identity verification framework for secure IoT hardware via device authentication. World Wide Web 2020, 23, 1057–1088. [Google Scholar] [CrossRef]
- Parvardeh, M.J.; Shokouhi, S.B. A Ring Oscillator PUF Architecture With Enhanced Challenge-Response Set. In Proceedings of the 2019 9th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 24–25 October 2019; pp. 444–449. [Google Scholar]
- Kim, B.; Yoon, S.; Kang, Y.; Choi, D. PUF based IoT Device Authentication Scheme. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 16–18 October 2019; pp. 1460–1462. [Google Scholar]
- Bosselaers, A.; Preneel, B. Chapter 6 SKID. In Integrity Primitives for Secure Information Systems; Springer: Berlin/Heidelberg, Germany, 1995; pp. 169–178. [Google Scholar]
- Menezes, A.; Vanstone, S.; Oorschot, P.V. Handbook of Applied Cryptography; CRC Press: Boca Raton, USA, 1997. [Google Scholar]
- Cremers, C.; Mauw, S. Operational Semantics of Security Protocols; CISPA: Saarbrücken, Germany, 2005. [Google Scholar] [CrossRef] [Green Version]
- Cremers, C.J.F. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In Computer Aided Verification; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar] [CrossRef] [Green Version]
- Lowe, G. A hierarchy of authentication specifications. In Proceedings of the 10th Computer Security Foundations Workshop, Rockport, MA, USA, 10–12 June 1997. [Google Scholar] [CrossRef] [Green Version]
- Basin, D.; Cremers, C.; Meier, S. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication. J. Comput. Secur. 2013, 21, 817–846. [Google Scholar] [CrossRef] [Green Version]
- Square. OKHTTP Android Library. Available online: https://square.github.io/okhttp/ (accessed on 11 December 2021).
- Open Handset Alliance. Android Debug Bridge Wifi for Android 11. Available online: https://developer.android.com/studio/command-line/adb (accessed on 11 December 2021).
- Tidelift. Python Websockets Library. Available online: https://github.com/aaugustin/websockets (accessed on 11 December 2021).
- Python Software Foundation. Python Random Library. Available online: https://docs.python.org/3/library/random.html (accessed on 11 December 2021).
- Python Software Foundation. Keyed-Hashing for Message Authentication in Python. Available online: https://docs.python.org/3/library/hmac.html (accessed on 11 December 2021).
- Hayashi, V.; Ruggiero, W. Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior. Sensors 2020, 20, 6563. [Google Scholar] [CrossRef]
- Williams, J.A.; Cook, D.J. Forecasting behavior in smart homes based on sleep and wake patterns. Technol. Health Care 2017, 25, 89–110. [Google Scholar] [CrossRef] [Green Version]
- Minor, B.D.; Doppa, J.R.; Cook, D.J. Learning Activity Predictors from Sensor Data: Algorithms, Evaluation, and Applications. IEEE Trans. Knowl. Data Eng. 2017, 29, 2744–2757. [Google Scholar] [CrossRef]
- Cook, D.J.; Krishnan, N.C.; Rashidi, P. Activity discovery and activity recognition: A new partnership. IEEE Trans. Cybern. 2013, 43, 820–828. [Google Scholar] [CrossRef] [Green Version]
- Hayashi, V.T.; Arakaki, R.; Fujii, T.Y.; Khalil, K.A.; Hayashi, F.H. B2B B2C Architecture for Smart Meters using IoT and Machine Learning: A Brazilian Case Study. In Proceedings of the 2020 International Conference on Smart Grids and Energy Systems (SGES), Perth, Australia, 23–26 November 2020. [Google Scholar] [CrossRef]
- Hayashi, V.T.; Arakaki, R.; Ruggiero, W.V. OKIoT: Trade off analysis of smart speaker architecture on open knowledge IoT project. Internet Things 2020, 12, 100310. [Google Scholar] [CrossRef]
- Lin, B.; Cook, D.J.; Schmitter-Edgecombe, M. Using continuous sensor data to formalize a model of in-home activity patterns. J. Ambient. Intell. Smart Environ. 2020, 12, 183–201. [Google Scholar] [CrossRef]
- Aminikhanghahi, S.; Cook, D.J. Enhancing activity recognition using CPD-based activity segmentation. Pervasive Mob. Comput. 2019, 53, 75–89. [Google Scholar] [CrossRef]
- Pedregosa, F.; Varoquaux, G.; Gramfort, A.; Michel, V.; Thirion, B.; Grisel, O.; Blondel, M.; Müller, A.; Nothman, J.; Louppe, G.; et al. Scikit-Learn: Machine Learning in Python. J. Mach. Learn. Res. 2011, 12, 2825–2830. [Google Scholar]
- Fedorov, A.K.; Kiktenko, E.O.; Lvovsky, A.I. Quantum Computers Put Blockchain Security at Risk. Available online: https://www.nature.com/articles/d41586-018-07449-z (accessed on 11 December 2021).
- Perlner, R.A.; Cooper, D.A. Quantum resistant public key cryptography: A survey. In Proceedings of the 8th Symposium on Identity and Trust on the Internet, Gaithersburg, MD, USA, 14–16 April 2009; pp. 85–93. [Google Scholar]
- Chen, L.; Chen, L.; Jordan, S.; Liu, Y.K.; Moody, D.; Peralta, R.; Perlner, R.; Smith-Tone, D. Report on Post-Quantum Cryptography; US Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016; Volume 12. [Google Scholar]
- Ikeda, K. Security and privacy of blockchain and quantum computation. In Advances in Computers; Elsevier: Amsterdam, The Netherlands, 2018; Volume 111, pp. 199–228. [Google Scholar]
- Aggarwal, D.; Brennen, G.K.; Lee, T.; Santha, M.; Tomamichel, M. Quantum attacks on Bitcoin, and how to protect against them. arXiv 2017, arXiv:1710.10377. [Google Scholar] [CrossRef] [Green Version]
- Ikeda, K. qBitcoin: A peer-to-peer quantum cash system. In Proceedings of the Science and Information Conference, London, UK, 10–12 July 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 763–771. [Google Scholar]
- Takeda, S.; Mizuta, T.; Fuwa, M.; Van Loock, P.; Furusawa, A. Deterministic quantum teleportation of photonic quantum bits by a hybrid technique. Nature 2013, 500, 315–318. [Google Scholar] [CrossRef] [Green Version]
- Gottesman, D.; Chuang, I. Quantum digital signatures. arXiv 2001, arXiv:quant-ph/0105032. [Google Scholar]
- Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
- Wang, Q.; Wang, D.; Cheng, C.; He, D. Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices. IEEE Trans. Dependable Secur. Comput. 2021, 18, 1591–1604. [Google Scholar] [CrossRef]
- Cheng, H.; Dinu, D.; Großschädl, J. Efficient implementation of the SHA-512 hash function for 8-bit AVR microcontrollers. In Proceedings of the International Conference on Security for Information Technology and Communications, Bucharest, Romania, 8–9 November 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 273–287. [Google Scholar]
- Balasch, J.; Ege, B.; Eisenbarth, T.; Gérard, B.; Gong, Z.; Güneysu, T.; Heyse, S.; Kerckhof, S.; Koeune, F.; Plos, T.; et al. Compact implementation and performance evaluation of hash functions in attiny devices. In Proceedings of the International Conference on Smart Card Research and Advanced Applications, Graz, Austria, 28–30 November 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 158–172. [Google Scholar]
- Nef, T.; Urwyler, P.; Büchler, M.; Tarnanas, I.; Stucki, R.; Cazzoli, D.; Müri, R.; Mosimann, U. Evaluation of three state-of-the-art classifiers for recognition of activities of daily living from smart home ambient data. Sensors 2015, 15, 11725–11740. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.; Ouyang, D.; Liu, Y.; Chen, R. A novel approach based on time cluster for activity recognition of daily living in smart homes. Symmetry 2017, 9, 212. [Google Scholar] [CrossRef]
- Bonneau, J.; Herley, C.; Van Oorschot, P.C.; Stajano, F. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 20–23 May 2012; pp. 553–567. [Google Scholar]
- Inthavisas, K.; Lopresti, D. Secure speech biometric templates for user authentication. IET Biom. 2012, 1, 46–54. [Google Scholar] [CrossRef]
- Sadeghi, K.; Banerjee, A.; Sohankar, J.; Gupta, S.K. Geometrical analysis of machine learning security in biometric authentication systems. In Proceedings of the 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico, 18–21 December 2017; pp. 309–314. [Google Scholar]
- Feng, Y.C.; Yuen, P.C. Binary discriminant analysis for generating binary face template. IEEE Trans. Inf. Forensics Secur. 2011, 7, 613–624. [Google Scholar] [CrossRef]
- Chen, S.; Li, B.; Cao, Y. Intrinsic Physical Unclonable Function (PUF) Sensors in Commodity Devices. Sensors 2019, 19, 2428. [Google Scholar] [CrossRef] [Green Version]
- Wang, W.; Guin, U.; Singh, A. Aging-Resilient SRAM-based True Random Number Generator for Lightweight Devices. J. Electron. Test. 2020, 36, 301–311. [Google Scholar] [CrossRef]
- Lee, S.; Oh, M.K.; Kang, Y.; Choi, D. Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices. Sensors 2020, 20, 404. [Google Scholar] [CrossRef] [Green Version]
- Blanchet, B. Automatic proof of strong secrecy for security protocols. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 12 May 2004; pp. 86–100. [Google Scholar] [CrossRef]
Solution | Trusted Device | Biometrics | Behavior | Invasive | Enrollment | Users | Accuracy | Response Time (ms) |
---|---|---|---|---|---|---|---|---|
VoicePop [21] | No | Yes | No | No | Complex | 18 | 90% | - |
2MA [22] | No | Yes | No | No | Complex | - | 84% | - |
VSButton [23] | No | No | Yes | No | Simple | - | - | - |
WifiU [24] | No | Yes | Yes | No | Complex | 50 | 92% | - |
Shi et al. [25] | No | No | Yes | No | Complex | 11 | 92% | - |
UCFL [26] | Yes | No | No | No | Simple | - | - | 150 |
EarEcho [27] | No | Yes | No | Yes | Complex | 20 | 95% | 1000 |
PALOT [29] | No | No | Yes | No | Complex | 24 | 70% | - |
REVOLT [30] | No | Yes | Yes | No | Complex | 10 | 97% | 1100 |
Wivo [31] | No | No | Yes | No | Complex | 5 | 96% | 320 |
VAuth [32] | Yes | Yes | No | Yes | Simple | 18 | 97% | 300 |
Scenario | Number of Time Series | Kitchen | Living Room | Accuracy | Hands-Free Recall |
---|---|---|---|---|---|
A | 7 | yes | yes | 95.76% | 76% |
B | 5 | yes | yes | 97.03% | 81% |
C | 3 | yes | yes | 97.79% | 80% |
D | 3 | yes | no | 92.11% | 37% |
Solution | Trusted Device | Biometrics | Behavior | Invasive | Enrollment | Users | Accuracy | Response Time (ms) |
---|---|---|---|---|---|---|---|---|
VoicePop [21] | No | Yes | No | No | Complex | 18 | 90% | - |
2MA [22] | No | Yes | No | No | Complex | - | 84% | - |
VSButton [23] | No | No | Yes | No | Simple | - | - | - |
WifiU [24] | No | Yes | Yes | No | Complex | 50 | 92% | - |
Shi et al. [25] | No | No | Yes | No | Complex | 11 | 92% | - |
UCFL [26] | Yes | No | No | No | Simple | - | - | 150 |
EarEcho [27] | No | Yes | No | Yes | Complex | 20 | 95% | 1000 |
PALOT [29] | No | No | Yes | No | Complex | 24 | 70% | - |
REVOLT [30] | No | Yes | Yes | No | Complex | 10 | 97% | 1100 |
Wivo [31] | No | No | Yes | No | Complex | 5 | 96% | 320 |
VAuth [32] | Yes | Yes | No | Yes | Simple | 18 | 97% | 300 |
Proposed Solution | Yes | No | Yes | No | Simple | 4 | 97% | 383 |
Solution | Usability | Deployability | Security | |||||
---|---|---|---|---|---|---|---|---|
Memorywise- Effortless | Nothing- to-Carry | Easy- to-Learn | Infrequent- Errors | Negligible-Cost- per-User | Resilient-to-Leaks- from-Other-Verifiers | Resilient- to-Theft | Requiring-Explicit -Consent | |
4-digit spoken PIN | yes | yes | yes | yes | yes | no | yes | yes |
Mobile Token | yes | no | yes | yes | yes | yes | yes | yes |
Voice Biometrics | yes | yes | yes | no | yes | no | yes | no |
Wearable | yes | no | yes | yes | no | yes | no | no |
Behavior Biometrics | yes | yes | yes | no | yes | no | yes | no |
Proposed | yes | yes | yes | yes | no | yes | no | no |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hayashi, V.T.; Ruggiero, W.V. Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning. Sensors 2022, 22, 1325. https://doi.org/10.3390/s22041325
Hayashi VT, Ruggiero WV. Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning. Sensors. 2022; 22(4):1325. https://doi.org/10.3390/s22041325
Chicago/Turabian StyleHayashi, Victor Takashi, and Wilson Vicente Ruggiero. 2022. "Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning" Sensors 22, no. 4: 1325. https://doi.org/10.3390/s22041325
APA StyleHayashi, V. T., & Ruggiero, W. V. (2022). Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning. Sensors, 22(4), 1325. https://doi.org/10.3390/s22041325