Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Secure Key Generation Using Contextual Audio with Intruder Detection

Author : Aparna A 1 Ajish S 2

Date of Publication :7th February 2016

Abstract: The implementation of a secure communication channel for the transfer of confidential data is one of the primary concerns in the field of security. The most important entity in a secure communication process is the cryptographic key generation used for encryption and decryption purposes among communicating partners. The key used in such a process must be extremely strong and secure enough so that it is untraceable to attackers. Many methods have been proposed for generating a secure key ranging from biometric techniques to that of the modern quantum cryptography. An approach to generate a shared key between two users is to exploit the contextual information present in the environment in which they are present. Many schemes are exists there for generating the shared cryptographic keys from recorded contextual information by each of the devices. Keys generated from contextual possess a greater level of robustness and uniqueness. A common audio fingerprinting approach in connection with error correction codes and fuzzy cryptography provides a predefined noise threshold level. The system is vulnerable to attackers from the same scenario even though we are considering the contextual audio. In this paper, we propose a new key generation scheme to build a secure communication channel between two users in the same environment.

Reference :

    1. Ngu Nguyen, Stephan Sigg, An Huynh, and Yusheng Ji, “Using ambient audio in secure mobile phone communication”, International Conference on Pervasive Computing and Communications, pp. 431-434, 2012
    2. Nguyen, Ngu, et al. "Pattern-based alignment of audio data for ad hoc secure device pairing.", Wearable Computers (ISWC), 2012 16th International Symposium on. IEEE, pp. 88-91, 2012.
    3. Sigg, Stephan, Dominik Schuermann, and Yusheng Ji. "Pintext: A framework for secure communication based on context.", Mobile and ubiquitous systems: Computing, networking, and services. Springer Berlin Heidelberg, pp. 314-325, 2012.
    4. D. Bichler, G. Stromberg, and M. Huemer, “Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks,” Proc. IEEE GlobeCom, pp. 177-181, 2007.
    5. D. Bichler, G. Stromberg, M. Huemer, and M. Loew, “Key Generation Based on Acceleration Data of Shaking Processes”, Proc. Ninth Int‟l Conf. Ubiquitous Computing, J. Krumm, ed., pp. 304-317, 2007.
    6. Mathur, Suhas, et al. "Proximate: proximity-based secure pairing using ambient wireless signals." Proceedings of the 9th international conference on Mobile systems, applications, and services. ACM, pp. 211-224, 2011.
    7. C. Yang, “MACS: Music Audio Characteristic Sequence Indexing for Similarity Retrieval,” Proc. IEEE Workshop

Recent Article