Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Secure voice based authentication for future IOT applications

Author : Mr.K.Ravi kishore 1 Dr.M.Humera Khanam 2 Ms.D.Sucharitha 3 Ms.G.Divya 4

Date of Publication :9th March 2017

Abstract: Internet of Things (IOT) is a network of all devices that can be accessed through the internet. Using existing network infrastructure, the devices can be remotely accessed and controlled, thus allowing a direct integration of computing systems with the physical world. It also reduces human involvement along with improving accuracy, efficiency and resulting in economic benefit. The IOT devices facilitate the day to day life of people. However, due to its heterogeneous and dynamic nature the IOT has an enormous threat to security and privacy in IOT environment the Authentication is one of the most challenging security requirement, where a user can directly access information from the devices, provided the mutual authentication between user and devices happens. A system that recognizes and authenticates the voice of a user by extracting the distinct features of their voice samples is usually termed as Voice recognition system. Converting the human voice into digital data can be carried out by Voice identification. The digitized audio samples then undergo feature excerption process to extract Mel Frequency Cepstral Coefficients (MFCC) features. These coefficients are subjected to feature matching through Dynamic Time Warping (DTW) to match with the patterns existing in the database for limited language words. In this paper we provide the IOT applications to the voice based authentication by providing a natural language processing interface. For better performance we can combine the digital and mathematical knowledge using MFCC and DTW to extract and match the features to improve the accuracy

Reference :

    1. P. Rohatgi, “A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication,” in 6th ACM Conference on Computer and Communications Security, New York, NY, USA, 1999, pp. 93–100.
    2. A. K. Das, P. Sharma, S. Chatterjee, and J. K. Sing, “A Dynamic password-based user authentication scheme for Hierarchical wireless sensor networks,” Journal of Network and Computer Applications, vol. 35, no. 5, pp. 1646–1656, 2012.
    3. M. Turkanovi, B. Brume, and M. Holbl, “A novel user Authentication and key agreement scheme for Heterogeneous ad hoc wireless sensor networks, based on The Internet of Things notion,” Ad Hoc Networks, vol. 20, pp. 96 – 112, 2014.
    4. Secure Hash Standard, FIPS PUB 180-1, and National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995

Recent Article