Visible to the public NAuth: Secure Face-to-Face Device Authentication via Nonlinearity

TitleNAuth: Secure Face-to-Face Device Authentication via Nonlinearity
Publication TypeConference Paper
Year of Publication2019
AuthorsZhou, Xinyan, Ji, Xiaoyu, Yan, Chen, Deng, Jiangyi, Xu, Wenyuan
Conference NameIEEE INFOCOM 2019 - IEEE Conference on Computer Communications
Keywordsacoustic nonlinearity patterns, Acoustics, authentication, critical security problem, device authentication consistency, device legitimacy, Device-to-device communication, face-to-face D2D, face-to-face device-to-device communication, face-to-face scenarios, Harmonic analysis, location-based-validation model, location-sensitive authentication mechanism, message authentication, microphones, mobile computing, mobile devices, Nhuth, Nonlinear distortion, pairing schemes, pubcrawl, resilience, Resiliency, secure authentication, secure face-to-face device authentication, Secure File Sharing, short distance file transfer, size 20.0 cm, telecommunication security, user intervention
AbstractWith the increasing prevalence of mobile devices, face-to-face device-to-device (D2D) communication has been applied to a variety of daily scenarios such as mobile payment and short distance file transfer. In D2D communications, a critical security problem is verifying the legitimacy of devices when they share no secrets in advance. Previous research addressed the problem with device authentication and pairing schemes based on user intervention or exploiting physical properties of the radio or acoustic channels. However, a remaining challenge is to secure face-to-face D2D communication even in the middle of a crowd, within which an attacker may hide. In this paper, we present Nhuth, a nonlinearity-enhanced, location-sensitive authentication mechanism for such communication. Especially, we target at the secure authentication within a limited range such as 20 cm, which is the common case for face-to-face scenarios. Nhuth contains averification scheme based on the nonlinear distortion of speaker-microphone systems and a location-based-validation model. The verification scheme guarantees device authentication consistency by extracting acoustic nonlinearity patterns (ANP) while the validation model ensures device legitimacy by measuring the time difference of arrival (TDOA) at two microphones. We analyze the security of Nhuth theoretically and evaluate its performance experimentally. Results show that Nhuth can verify the device legitimacy in the presence of nearby attackers.
Citation Keyzhou_nauth_2019