skip to main content
10.1145/3212480.3212501acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article
Public Access

Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks

Published:18 June 2018Publication History

ABSTRACT

Reducing the level of user effort involved in traditional two-factor authentication (TFA) constitutes an important research topic. A recent effort in this direction leverages ambient sounds to detect the proximity between the second factor device (phone) and the login terminal (browser), and eliminates the need for the user to transfer PIN codes. This approach is highly usable, but is completely vulnerable against far-near attackers, i.e., ones who are remotely located and can guess the victim's audio environment or make the phone create predictable sounds (e.g., ringers), and those who are in physical proximity of the user.

In this paper, we propose Listening-Watch, a new TFA mechanism based on a wearable device (watch/bracelet) and active browser-generated random speech sounds. As the user attempts to login, the browser populates a short random code encoded into speech, and the login succeeds if the watch's audio recording contains this code (decoded using speech recognition), and is similar enough to the browser's audio recording. The remote attacker, who has guessed the user's environment or created predictable phone/watch sounds, will be defeated since authentication success relies upon the presence of the random code in watch's recordings. The proximity attacker will also be defeated unless it is extremely close to the watch, since the wearable microphones are usually designed to be only capable of picking up nearby sounds (e.g., voice commands). Furthermore, due to the use of a wearable second factor device, Listening-Watch naturally enables two-factor security even when logging in from a mobile phone.

Our contributions are three-fold. First, we introduce the idea of strong and low-effort TFA based on wearable devices, active speech sounds and speech recognition, giving rise to the Listening-Watch system that is secure against both remote and proximity attackers. Second, we design and implement Listening-Watch for an Android smartwatch (and companion smartphone) and the Chrome browser, without the need for any browser plugins. Third, we evaluate Listening-Watch for authentication errors in both benign and adversarial settings. Our results show that Listening-Watch can result in minimal errors in both settings based on appropriate thresholdization and speaker volume levels.

References

  1. Yubico AB. 2017. Yubico | Trust the Net with YubiKey Strong Two-Factor Authentication. Retrieved May 13, 2017 from https://www.yubico.com/Google ScholarGoogle Scholar
  2. Authy. 2017. Two-Factor Authentication - Authy. Retrieved May 13, 2017 from https://www.authy.com/Google ScholarGoogle Scholar
  3. Joseph Bonneau, Cormac Herley, Paul C Van Oorschot, and Frank Stajano. 2012. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 553--567. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cd3dtech. 2017. How to Play Music Through the Internal Pc Speaker. Retrieved December 31, 2017 from https://cd3dtech.com/tutorials/general/how-to-play-music-through-the-internal-pc-speakerGoogle ScholarGoogle Scholar
  5. Celestix. 2017. Celestix HOTPin Two Factor Authentication. Retrieved May 13, 2017 from http://www.celestixworks.com/HOTPin.aspGoogle ScholarGoogle Scholar
  6. Chrome. 2017. Bluetooth - Google Chrome. Retrieved May 13, 2017 from https://developer.chrome.com/apps/app_bluetoothGoogle ScholarGoogle Scholar
  7. Alexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan Wallach, and Dirk Balfanz. 2012. Strengthening user authentication through opportunistic cryptographic identity assertions. In Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 404--414. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jun Du and Qiang Huo. 2011. A feature compensation approach using high-order vector Taylor series approximation of an explicit distortion model for noisy speech recognition. IEEE Transactions on Audio, Speech, and Language Processing 19, 8 (2011), 2285--2293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ramón Fernández Astudillo. 2010. Integration of Short-Time Fourier Domain Speech Enhancement and Observation Uncertainty Techniques for Robust Automatic Speech Recognition. (2010).Google ScholarGoogle Scholar
  10. Mozilla Foundation. 2017. Web Bluetooth API (Firefox OS. Retrieved May 13, 2017 from https://developer.mozilla.org/en-US/docs/Archive/B2G_OS/Bluetooth_APIGoogle ScholarGoogle Scholar
  11. John Gibson. 2017. Introduction to MIDI and Computer Music: The MIDI Standard. Retrieved December 31, 2017 from http://www.indiana.edu/~emusic/361/midi.htmGoogle ScholarGoogle Scholar
  12. Michael T Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun. 2006. Loud and clear: Human-verifiable authentication based on audio. In Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on. IEEE, 10--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Tzipora Halevi, Di Ma, Nitesh Saxena, and Tuo Xiang. 2012. Secure proximity detection for NFC devices based on ambient sensor data. In Computer Security--ESORICS 2012. Springer, 379--396.Google ScholarGoogle Scholar
  14. International Data Corporation (IDC). 2017. Basic Trackers Take a Back Seat as Smartwatches Accelerate in the Second Quarter, According to IDC. Retrieved December 28, 2017 from https://goo.gl/2wDj4xGoogle ScholarGoogle Scholar
  15. Analog Devices Inc. 2017. Understanding Microphone Sensitivity. Retrieved October 27, 2017 from https://goo.gl/WJhdCiGoogle ScholarGoogle Scholar
  16. Duo Security Inc. 2017. Easy Authentication: Duo Security. Retrieved May 13, 2017 from https://duo.com/solutions/features/user-experience/easy-authenticationGoogle ScholarGoogle Scholar
  17. Gartner Inc. 2017. Gartner Says Worldwide Wearable Device Sales to Grow 17 Percent in 2017. Retrieved December 28, 2017 from https://goo.gl/z7DTz1Google ScholarGoogle Scholar
  18. Google Inc. 2017. Google 2-Step Verification. Retrieved May 13, 2017 from https://www.google.com/landing/2step/Google ScholarGoogle Scholar
  19. Google Inc. 2017. Speech API - Speech Recognition | Google Cloud Platform. Retrieved May 13, 2017 from https://cloud.google.com/speech/Google ScholarGoogle Scholar
  20. Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-proof: usable two-factor authentication based on ambient sound. In USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Zbyn ek Koldovsky, Jirí Málek, Jan Nouza, and Miroslav Balík. 2011. CHiME data separation based on target signal cancellation and noise masking. In Machine Listening in Multisource Environments.Google ScholarGoogle Scholar
  22. Greg Kumpardk. 2014. Google Acquires SlickLogin, The Sound-Based Password Alternative | TechCrunch. Retrieved May 13, 2017 from http://techcrunch.com/2014/02/16/google-acquires-slicklogin-the-sound-based-password-alternative/Google ScholarGoogle Scholar
  23. Shrirang Mare, Andrés Molina Markham, Cory Cornelius, Ronald Peterson, and David Kotz. 2014. Zebra: Zero-effort bilateral recurring authentication. In Security and Privacy (SP), 2014 IEEE Symposium on. IEEE, 705--720. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. MathWorks. 2017. Butterworth filter design. Retrieved May 13, 2017 from http://www.mathworks.com/help/signal/ref/butter.htmlGoogle ScholarGoogle Scholar
  25. DPA Microphones. 2017. Large vs small diagpragms in microphones. Retrieved October 27, 2017 from https://goo.gl/TGjckeGoogle ScholarGoogle Scholar
  26. Nymi. 2017. Nymi | Always On Authentication. Retrieved October 27, 2017 from https://nymi.com/Google ScholarGoogle Scholar
  27. Ornate. 2017. Ornate TrueSmart. Retrieved May 13, 2017 from https://www.omate.com/Google ScholarGoogle Scholar
  28. World Health Organization. 2017. Make Listening Safe. Retrieved October 28, 2017 from https://goo.gl/4hfd98Google ScholarGoogle Scholar
  29. RSA. 2017. SecurID | RSA Security Token Based Authentication. Retrieved May 13, 2017 from https://www.yubico.com/Google ScholarGoogle Scholar
  30. Samsung. 2017. Samsung Gear S Smartwatch | Samsung. Retrieved May 13, 2017 from http://www.samsung.com/us/explore/gear-s-features-and-specs/Google ScholarGoogle Scholar
  31. Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, and Naveen Nathan. 2014. Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.. In Network and Distributed System Security Symposium.Google ScholarGoogle ScholarCross RefCross Ref
  32. Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, and Nitesh Saxena. {n. d.}. The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.. In Conference on Computer and Communications Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Claudio Soriente, Gene Tsudik, and Ersin Uzun. 2008. HAPADEP: human-assisted pure audio device pairing. Information Security (2008), 385--400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Study-Body-Language. 2017. Personal Distance -- Zones. Retrieved October 27, 2017 from http://www.study-body-language.com/Personal-distance.htmlGoogle ScholarGoogle Scholar
  35. Western Michigan University. 2017. Solfa Cipher. Retrieved December 31, 2017 from http://www.wmich.edu/mus-theo/solfa-cipher/Google ScholarGoogle Scholar
  36. Oriol Vinyals and Suman V Ravuri. 2011. Comparing multilayer perceptron to deep belief network tandem features for robust ASR. In Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. IEEE, 4596--4599.Google ScholarGoogle ScholarCross RefCross Ref
  37. WebRTC. 2017. WebRTC Home | WebRTC. Retrieved May 13, 2017 from https://webrtc.org/Google ScholarGoogle Scholar
  38. Felix Weninger, Martin Wöllmer, Jürgen Geiger, Björn Schuller, Jort F Gemmeke, Antti Hurmalainen, Tuomas Virtanen, and Gerhard Rigoll. 2012. Non-negative matrix factorization for highly noise-robust asr: To enhance or to recognize?. In Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on. IEEE, 4681--4684.Google ScholarGoogle ScholarCross RefCross Ref
  39. Brett Williams. 2017. Smartwatches surge to take the wearable crown. Retrieved December 28, 2017 from https://goo.gl/tJRfYGoogle ScholarGoogle Scholar
  40. Kevin W Wilson, Bhiksha Raj, Paris Smaragdis, and Ajay Divakaran. 2008. Speech denoising using nonnegative matrix factorization with priors. In Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. IEEE, 4029--4032.Google ScholarGoogle Scholar
  41. Paul A Zandbergen and Sean J Barbeau. 2011. Positional accuracy of assisted gps data from high-sensitivity gps-enabled mobile phones. Journal of Navigation 64, 03 (2011), 381--399.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks
    June 2018
    317 pages
    ISBN:9781450357319
    DOI:10.1145/3212480

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 June 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate98of338submissions,29%

    Upcoming Conference

    WiSec '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader