Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior
Abstract
:1. Introduction
- Public GIT repository [18]: software modules for synthetic data generation (coloured petri nets), data processing and algorithms for classification and prediction in single user and multi-user scenarios;
- Database [19]: public access to 2019 smart home dataset of three months from Brazilian smart home test bed.
- Data logger [20]: open data logger firmware module to accelerate offline data acquisition using ESP8266 IoT module through easy integration to Arduino projects and web-based interface.
2. Related Work
3. Proposed Non-Invasive Authorization in Open Architecture
4. Behavior Learning Method
4.1. Synthetic Data: Coloured Petri Net
4.2. Real Data: Smart Home Test Bed
4.3. Machine Learning
5. Behavior Algorithms Results
5.1. Single User Prediction based on Synthetic Data
5.2. Multi-User Scenario Prediction Based on Real Data
5.3. Cloud vs Local Time Evaluation for Prediction Using Test bed Data
5.4. Open|Closed Architecture and Invasive|Non-Invasive Authorization
- closed and invasive: existing authorization mechanism based on smartphone notification with a single smart speaker cloud services provider (Google);
- open: open smart speaker architecture allows local NLU service (RASA), and the combination of Natural Language services from different providers (IBM for Speech To Text, and Amazon for Text To Speech), but the authorization is still invasive;
- non-invasive: transparent authorization based on autonomous module enables friction-less financial transaction, but smart speaker services are still all cloud-based, from a single provider (Google); and,
- open and non-invasive: combination of open architecture and non-invasive authorization from previous scenarios, with Natural Language Understanding and Authorization performed in the edge.
6. Autonomous Device Challenge Response Authentication
6.1. System Model
- Bank with support to voice financial transactions, with integrated bank server.
- Mobile device with communication with bank server and Bluetooth communication with the autonomous device.
- Smart speaker responsible for hands-free, voice-based interactions with end user.
- Cloud voice services with natural language understanding, speech to text, and text to speech services in end user’s language.
- Autonomous device, responsible for smart home events logging, authorization, access control. It has Bluetooth communication with the mobile device.
- End user who has smart speaker and autonomous device at home. The end user is also a client of the bank and has a personal mobile device and associated bank account.
6.2. Security Concepts
6.3. Security Requirements
6.4. Enrollment Scheme
- Trusted location TL: as specified in Definition 3.
- Trusted device TD: as specified in Definition 4.
- Voice biometrics: voice model of user U for speaker identification.
- Password: static password, usually with 6 to 8 alphanumeric characters.
- Transaction value: low, medium and high value transactions range must be specified by user.
- Trust Level TLVL as specified in Definition 6.
6.5. Authentication Scheme
- Bank Server BS generates a random number rBS with sufficient randomness (possible due to high performance capabilities of bank server BS), which is used as a nonce to challenge the response protocol. BS sends random number rBS in clear text to autonomous device TD as the first challenge.
- Trusted autonomous device TD receives random number rBS from entity BS. Autonomous device TD uses its Physical Unclonable Function (PUF) as a seed to a pseudo-random number generator in order to obtain random number rTD. With shared key K (unique for each autonomous device), random number received rBS, and random number generated rTD, entity TD uses a one-way (non-reversible) function h (the use of (keyed) one-way is a lightweight alternative to encryption algorithms):Autonomous trusted device TD sends the result of one-way function as a response to the first challenge, and random number rTD that is generated to bank server BS as a second challenge.
- Bank server BS receives one-way function computed by TD, and random number rTD. Entity BS performs look-up in its secret database to obtain shared key K. With rTD, shared key K, and rBS generated in step 1, bank server BS computes one-way function:Entity BS compares the result of one-way function with received result from TD. If the values match, then the identity of autonomous device TD is verified by bank server BS, thus ending the first challenge.Bank server BS computes the response to second challenge by using one-way function:Entity BS sends the generated response to entity TD.
- Upon receival of response to second challenge, autonomous device TD computes expected response by using previous random numbers rBS and rTD, and shared key K:If the result that is received from BS matches the computed result, then the identity of bank server BS is verified by autonomous device TD.
- TD ← BS: rBS
- TD → BS: rTD, hK(rBS,rTD,bs)
- TD ← BS: hK(rTD,rBS,td)
6.6. Security Formal Analysis Using BAN Logic
- (1)
- TD TD BS
- (2)
- BS TD BS
- (3)
- TD , where Ntd is the nonce generated by TD
- (4)
- BS , where Nbs is the nonce that is generated by BS
- (M1) TD ← BS: Nbs
- (M2) TD → BS: Ntd,
- (M1) TD ← BS:
- (A)
- Annotation rule with (4) yields: BS
- (B)
- Annotation rule also yields: BS (Ntd, )
- (C)
- Apply formula components rule in (B) in order to obtain: BS
- (D)
- Message-meaning rule using (A) and (C) statements yields: BS TD
- (E)
- Formula freshness rule using (A) and (D) yields: BS
- (F)
- Nonce-verification rule using (D) and (E) yields: BS TD (Nbs,Ntd,bs)
- (G)
- Formula composition rule with (F) yields: BS TD bs
- (H)
- Annotation rule with (3) yields: TD
- (I)
- Annotation rule with (3) also yields: TD
- (J)
- Message-meaning rule with (H) and (I) yields: TD BS (Ntd,Nbs,td)
- (K)
- Formula freshness rule while using (H) and (J) yields: TD
- (L)
- Nonce-verification rule using (J) and (K) yields: TD BS (Ntd,Nbs,td)
- (M)
- Formula composition rule with (L) yields: TD BS td
6.7. Security Informal Analysis
7. Discussion
8. Final Considerations
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Gebhart, A. Google Assistant Expands to a Billion Devices and 80 Countries. 2019. Available online: https://www.cnet.com/news/google-assistant-expands-to-a-billion-devices-and-80-countries/ (accessed on 9 November 2020).
- Bohn, D. Amazon Says 100 Million Alexa Devices Have Been Sold—What’s Next? 2019. Available online: https://www.theverge.com/2019/1/4/18168565/ (accessed on 9 November 2020).
- Kinsella, B. New Voicebot Report Says Nearly 20% of U.S. Adults Have Smart Speakers. 2018. Available online: https://voicebot.ai/2018/03/07/new-voicebot-report-says-nearly-20-u-s-adults-smart-speakers/ (accessed on 9 November 2020).
- Ericsson Past and Present Reports—Mobility Report with Internet of Things Forecast. 2020. Available online: https://www.ericsson.com/en/mobility-report/internet-of-things-forecast (accessed on 9 November 2020).
- Köckemann, U.; Alirezaie, M.; Renoux, J.; Tsiftes, N.; Ahmed, M.U.; Morberg, D.; Lindén, M.; Loutfi, A. Open-source data collection and data sets for activity recognition in smart homes. Sensors (Switzerland) 2020, 20, 879. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Schwartz, E.H. Amazon Expands Alexa Utility Bill Payment Feature Worldwide. 2019. Available online: https://voicebot.ai/2019/10/28/amazon-expands-alexa-utility-bill-payment-feature-worldwide/ (accessed on 9 November 2020).
- Kastrenakes, J. You Can Now Order Food from Grubhub with Alexa. 2017. Available online: https://www.theverge.com/2017/3/15/14908894/grubhub-alexa-ordering-integration-seamless (accessed on 9 November 2020).
- Axis. Axis Voice Banking. 2020. Available online: https://www.axisbank.com/axis-voice-banking (accessed on 9 November 2020).
- AmericanExpress. Amex Skill for Amazon Alexa. 2020. Available online: https://www.americanexpress.com/us/alexa/ (accessed on 9 November 2020).
- CapitalOne. Alexa Capital One Skill. 2020. Available online: https://www.capitalone.com/applications/alexa/ (accessed on 9 November 2020).
- Daon. Identity X Platform. 2020. Available online: https://www.daon.com/products/identityx-platform (accessed on 9 November 2020).
- de Barcelos Silva, A.; Gomes, M.M.; da Costa, C.A.; da Rosa Righi, R.; Barbosa, J.L.V.; Pessin, G.; De Doncker, G.; Federizzi, G. Intelligent personal assistants: A systematic literature review. Expert Syst. Appl. 2020, 147, 113193. [Google Scholar] [CrossRef]
- AmericanExpress. Terms and Conditions for American Express Alexa Skill. 2020. Available online: https://www.americanexpress.com/us/alexa/terms.html (accessed on 9 November 2020).
- Axis. Terms and Conditions for Axis Bank Alexa Skill. 2020. Available online: https://www.axisbank.com/chatbot/alexa-voice-banking-tnc.pdf (accessed on 9 November 2020).
- CapitalOne. Terms and Conditions for Capital One Alexa Skill. 2020. Available online: https://www.capitalone.com/applications/alexa/terms/ (accessed on 9 November 2020).
- TheGuardian. Alexa rEcorded Conversation and Sent It to Random Contact. 2020. Available online: https://www.theguardian.com/technology/2018/may/24/amazon-alexa-recorded-conversation (accessed on 9 November 2020).
- MediaPost. Amazon: ’Common Sense’ Requires Dismissal Of Alexa Privacy Suit. 2020. Available online: https://www.mediapost.com/publications/article/345560/ (accessed on 9 November 2020).
- Hayashi, V.T. Ambient Intelligence Modules for Synthetic Data Generation and Supervised Learning Algorithms. 2020. Available online: https://github.com/vthayashi/OKIoT/tree/master/AmbientIntelligence (accessed on 9 November 2020).
- Hayashi, V.T. Brazilian Multi User Smart Home Testbed Data with Motion and Light Events. 2020. Available online: https://github.com/vthayashi/OKIoT/tree/master/BrazilTestbed (accessed on 9 November 2020).
- Hayashi, V.T. Data Logger Module. 2020. Available online: https://github.com/vthayashi/OKIoT/tree/master/Datalogger (accessed on 9 November 2020).
- Gusmeroli, S.; Piccione, S.; Rotondi, D. A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Model. 2013, 58, 1189–1205. [Google Scholar] [CrossRef]
- Ashibani, Y.; Mahmoud, Q.H. A User Authentication Model for IoT Networks Based on App Traffic Patterns. In Proceedings of the 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON 2018), Vancouver, BC, Canada, 1–3 November 2018; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA, 2019; pp. 632–638. [Google Scholar] [CrossRef]
- Mocrii, D.; Chen, Y.; Musilek, P. IoT-based smart homes: A review of system architecture, software, communications, privacy and security. Int. Things 2018, 1–2, 81–98. [Google Scholar] [CrossRef]
- Alepis, E.; Patsakis, C. Monkey Says, Monkey Does: Security and Privacy on Voice Assistants. IEEE Access 2017, 5, 17841–17851. [Google Scholar] [CrossRef]
- Zhang, G.; Yan, C.; Ji, X.; Zhang, T.; Zhang, T.; Xu, W. Dolphinattack: Inaudible voice commands. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 103–117. [Google Scholar]
- Xie, Y.; Shi, C.; Li, Z.; Liu, J.; Chen, Y.; Yuan, B. Real-time, universal, and robust adversarial attacks against speaker recognition systems. In Proceedings of the ICASSP 2020–2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 4–8 May 2020; pp. 1738–1742. [Google Scholar]
- Das, A.K.; Kalam, S.; Sahar, N.; Sinha, D. UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices. Comput. Secur. 2020, 97. [Google Scholar] [CrossRef]
- Allhoff, F.; Henschke, A. The Internet of Things: Foundational ethical issues. Int. Things 2018, 1–2, 55–66. [Google Scholar] [CrossRef]
- Edu, J.S.; Such, J.M.; Suarez-Tangil, G. Smart Home Personal Assistants: A Security and Privacy Review. arXiv 2019, arXiv:1903.05593. [Google Scholar]
- Ashary, E.; Chow, C.E.; Korpe, A.; Thorpe, D. R2D2: Right Place, Right Path Data Delivery. In Proceedings of the 2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, 7–10 August 2017. [Google Scholar]
- Mazurek, M.L.; Arsenault, J.P.; Bresee, J.; Gupta, N.; Ion, I.; Johns, C.; Lee, D.; Liang, Y.; Olsen, J.; Salmon, B.; et al. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In Proceedings of the CHI ’10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, GA, USA, 10–15 April 2010. [Google Scholar]
- Malkin, N.; Deatrick, J.; Tong, A.; Wijesekera, P.; Egelman, S.; Wagner, D. Privacy Attitudes of Smart Speaker Users. Proc. Priv. Enhancing Technol. 2019, 2019, 250–271. [Google Scholar] [CrossRef] [Green Version]
- Apthorpe, N.; Shvartzshnaider, Y.; Mathur, A.; Reisman, D.; Feamster, N. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity. Proc. ACM Int. Mob. Wearable Ubiquitous Technol. 2018, 2, 1–23. [Google Scholar] [CrossRef] [Green Version]
- Dahmen, J.; Thomas, B.L.; Cook, D.J.; Wang, X. Activity learning as a foundation for security monitoring in smart homes. Sensors (Switzerland) 2017, 17, 737. [Google Scholar] [CrossRef] [PubMed]
- Gurulian, I.; Shepherd, C.; Frank, E.; Markantonakis, K.; Akram, R.N.; Mayes, K. On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. In Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, 1–4 August 2017; pp. 41–49. [Google Scholar]
- Hashan, B.; Abeyrathna, Y.; Kaluaratchi, M.; Thelijjagoda, S. VoiceNote: An Intelligent tool for monetary transactions with integrated voice support. In Proceedings of the 2019 International Research Conference on Smart Computing and Systems Engineering (SCSE), Colombo, Sri Lanka, 28 March 2019. [Google Scholar]
- Jang, I.; Lee, D.; Choi, J.; Son, Y. An approach to share self-taught knowledge between home IoT devices at the edge. Sensors (Switzerland) 2019, 19, 833. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ongun, T.; Oprea, A.; Nita-Rotaru, C.; Christodorescu, M.; Salajegheh, N. The House That Knows You; Association for Computing Machinery (ACM): New York, NY, USA, 2018; pp. 2255–2257. [Google Scholar]
- Cook, D. Center of Advanced Studies in Adaptive System. 2020. Available online: http://casas.wsu.edu/ (accessed on 9 November 2020).
- Almeida, A.; Azkune, G. Predicting human behaviour with recurrent neural networks. Appl. Sci. (Switzerland) 2018, 8, 305. [Google Scholar] [CrossRef] [Green Version]
- Guo, J.; Li, Y.; Hou, M.; Han, S.; Ren, J. Recognition of daily activities of two residents in a smart home based on time clustering. Sensors (Switzerland) 2020, 20, 1457. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.; Ouyang, D.; Liu, Y.; Chen, R. A novel approach based on time cluster for activity recognition of daily living in smart homes. Symmetry 2017, 9, 212. [Google Scholar] [CrossRef]
- Debes, C.; Merentitis, A.; Sukhanov, S.; Niessen, M.; Frangiadakis, N.; Bauer, A. Monitoring activities of daily living in smart homes: Understanding human behavior. IEEE Signal Proc. Mag. 2016, 33, 81–94. [Google Scholar] [CrossRef]
- Doan, T.T.; Safavi-Naini, R.; Li, S.; Avizheh, S.; Muni Venkateswarlu, K.; Fong, P.W.L. Towards a Resilient Smart Home; Association for Computing Machinery (ACM): New York, NY, USA, 2018; pp. 15–21. [Google Scholar] [CrossRef]
- Preuveneers, D.; Tsingenopoulos, I.; Joosen, W. Resource usage and performance trade-offs for machine learning models in smart environments. Sensors (Switzerland) 2020, 20, 1176. [Google Scholar] [CrossRef] [Green Version]
- Gürses, S.; Troncoso, C.; Diaz, C. Engineering Privacy by Design. Comput. Priv. Data Prot. 2011, 14, 25. [Google Scholar]
- Coucke, A.; Saade, A.; Ball, A.; Bluche, T.; Caulier, A.; Leroy, D.; Doumouro, C.; Gisselbrecht, T.; Caltagirone, F.; Lavril, T.; et al. Snips Voice Platform: An embedded Spoken Language Understanding system for private-by-design voice interfaces. arXiv 2018, arXiv:1805.10190. [Google Scholar]
- Monteriù, A.; Prist, M.R.; Frontoni, E.; Longhi, S.; Pietroni, F.; Casaccia, S.; Scalise, L.; Cenci, A.; Romeo, L.; Berta, R.; et al. A smart sensing architecture for domestic monitoring: Methodological approach and experimental validation. Sensors (Switzerland) 2018, 18, 2310. [Google Scholar] [CrossRef] [Green Version]
- Feng, H.; Fawaz, K.; Shin, K.G. Continuous authentication for voice assistants. In MobiCom ’17: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking; Association for Computing Machinery: New York, NY, USA, 2017; Volume Part F131210, pp. 343–355. [Google Scholar] [CrossRef] [Green Version]
- Nef, T.; Urwyler, P.; Büchler, M.; Tarnanas, I.; Stucki, R.; Cazzoli, D.; Müri, R.; Mosimann, U. Evaluation of three state-of-the-art classifiers for recognition of activities of daily living from smart home ambient data. Sensors (Switzerland) 2015, 15, 11725–11740. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Hasan, M.; Milon Islam, M.; Ishrak Islam Zarif, M.; Hashem, M. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Int. Thing 2019, 7, 100059. [Google Scholar] [CrossRef]
- Bertin, E.; Hussein, D.; Sengul, C.; Frey, V. Access control in the Internet of Things: A survey of existing approaches and open research questions. Ann. Telecommun. 2019, 74, 375–388. [Google Scholar] [CrossRef] [Green Version]
- Musale, P.; Baek, D.; Choi, B.J. Lightweight gait based authentication technique for IoT using subconscious level activities. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018; pp. 564–567. [Google Scholar] [CrossRef]
- Meidan, Y.; Bohadana, M.; Shabtai, A.; Guarnizo, J.D.; Ochoa, M.; Tippenhauer, N.O.; Elovici, Y. ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis. In Proceedings of the ACM Symposium on Applied Computing; Association for Computing Machinery: New York, NY, USA, 2017; Volume Part F128005, pp. 506–509. [Google Scholar] [CrossRef] [Green Version]
- Shi, C.; Liu, J.; Liu, H.; Chen, Y. Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT; Association for Computing Machinery (ACM): New York, NY, USA, 2017; pp. 1–10. [Google Scholar] [CrossRef]
- Mokhtari, G.; Anvari-Moghaddam, A.; Zhang, Q.; Karunanithi, M. Multi-residential activity labelling in smart homes with wearable tags using BLE technology. Sensors (Switzerland) 2018, 18, 908. [Google Scholar] [CrossRef] [Green Version]
- Association for Computing Machinery; Sigarch; ACM Special Interest Group in Operating Systems; ACM Special Interest Group on Programming Languages. ASPLOS-X Proceedings: Tenth International Conference On Architectural Support for Programming Languages and Operating Systems, San Jose, California, October 5-9, 2002; Association for Computing Machinery: New York, NY, USA, 2002; p. 320. [Google Scholar]
- Synnott, J.; Nugent, C.; Jeffers, P. Simulation of smart home activity datasets. Sensors (Switzerland) 2015, 15, 14162–14179. [Google Scholar] [CrossRef]
- Xu, D.; Member, S.; Nygard, K.E. Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. IEEE Trans. Softw. Eng. 2006, 32, 265–278. [Google Scholar] [CrossRef]
- Jensen, K.; Kristensen, L.M. Colored petri nets: A graphical language for formal modeling and validation of concurrent systems. Commun. ACM 2015, 58, 61–70. [Google Scholar] [CrossRef]
- Hayashi, V.; Garcia, V.; Manzan de Andrade, R.; Arakaki, R. OKIoT Open Knowledge IoT Project: Smart Home Case Studies of Short-term Course and Software Residency Capstone Project. In Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, SCITEPRESS–Science and Technology Publications, Prague, Czech Republic, 7–9 May 2020; pp. 235–242. [Google Scholar] [CrossRef]
- Hayashi, V.T.; Yassuda, D.S.Y.; De Melo, G.S.; Possani, H.D.S. Hedwig-Casa Conectada. 2017. Available online: https://github.com/hedwig-project (accessed on 9 November 2020).
- Szewcyzk, S.; Dwan, K.; Minor, B.; Swedlove, B.; Cook, D. Annotating smart environment sensor data for activity learning. Technol. Health Care 2009, 17, 161–169. [Google Scholar] [CrossRef] [Green Version]
- Alemdar, H.; Ertan, H.; Durmaz Incel, O.; Ersoy, C. ARAS Human Activity Datasets in Multiple Homes with Multiple Residents. In Proceedings of the 2013 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, Venice, Italy, 5–8 May 2013. [Google Scholar]
- Galissot, M.; Caelen, J.; Jambon, F.; Mellon, B. Une plateforme usage pour l’intégration de l’informatique ambiante dans l’habitat. L’appartement Domus. Tech. Sci. Inf. 2013, 32, 547–574. [Google Scholar] [CrossRef]
- Cook, D.J.; Schmitter-Edgecombe, M. Assessing the quality of activities in a smart environment. Meth. Inf. Med. 2009, 48, 480–485. [Google Scholar] [CrossRef] [Green Version]
- Abdulrahman, S.A.; Khalifa, W.; Roushdy, M.; Salem, A.B.M. Comparative study for 8 computational intelligence algorithms for human identification. Comput. Sci. Rev. 2020, 26, 100237. [Google Scholar] [CrossRef]
- Yang, D.; Ma, L.; Liao, F. An Intelligent Voice Interaction System Based on Raspberry Pi. In Proceedings of the 2019 11th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC 2019), Hangzhou, China, 24–25 August 2019; Volume 1, pp. 237–240. [Google Scholar] [CrossRef]
- Ning, H.; Farha, F.; Ullah, A.; Mao, L. Physical unclonable function: Architectures, applications and challenges for dependable security. IET Circuits Devices Syst. 2020, 14, 407–424. [Google Scholar] [CrossRef]
- Wortman, P.; Yan, W.; Chandy, J.; Tehranipoor, F. P2M-based security model: Security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices. IET Comput. Digit. Tech. 2018, 12, 289–296. [Google Scholar] [CrossRef]
- Huang, Z.; Wang, Q. A PUF-based unified identity verification framework for secure IoT hardware via device authentication. World Wide Web 2020, 23, 1057–1088. [Google Scholar] [CrossRef]
- ODonnell, C.W.; Suh, G.E.; Devadas, S. PUF-based random number generation. MIT CSAIL CSG Tech. Memo 2004, 481. Available online: http://csg.csail.mit.edu/pubs/memos/Memo-481/Memo-481.pdf (accessed on 9 November 2020).
- Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; Technical Report; Booz-Allen and Hamilton Inc.: Mclean, VA, USA, 2001. [Google Scholar]
- Maiti, A.; Nagesh, R.; Reddy, A.; Schaumont, P. Physical unclonable function and true random number generator: A compact and scalable implementation. In Proceedings of the 19th ACM Great Lakes symposium on VLSI, Boston Area, MA, USA, 10–12 May 2009; pp. 425–428. [Google Scholar]
- Menezes, A.; Vanstone, S.; Oorschot, P.V. Handbook of Applied Cryptography; Technical Report; CRC: Boca Raton, FL, USA, 1997. [Google Scholar]
- Bani-Hani, A.; Majdalweieh, M.; AlShamsi, A. Online authentication methods used in banks and attacks against these methods. In Procedia Computer Science; Elsevier B.V.: Amsterdam, The Netherlands, 2019; Volume 151, pp. 1052–1059. [Google Scholar] [CrossRef]
- Sinigaglia, F.; Carbone, R.; Costa, G.; Zannone, N. A survey on multi-factor authentication for online banking in the wild. Comput. Secur. 2020, 95. [Google Scholar] [CrossRef]
- Kiljan, S.; Vranken, H.; van Eekelen, M. Evaluation of transaction authentication methods for online banking. Future Gener. Comput. Syst. 2018, 80, 430–447. [Google Scholar] [CrossRef]
- Ogbanufe, O.; Kim, D.J. Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decis. Support Syst. 2018, 106, 1–14. [Google Scholar] [CrossRef]
- Bosselaers, A.; Preneel, B. SKID. In Integrity Primitives for Secure Information Systems; Springer: Berlin/Heidelberg, Germany, 1995; pp. 169–178. [Google Scholar]
- ISO 9798-2. Information Technology-Security Techniques-Entity Authentication—Part-2. In Information Technology-Security Techniques-Entity Authentication; International Organization for Standardization: Geneve, Switzerland, 2019. [Google Scholar]
- Burrows, M.; Abadi, M.; Needham, R.M. A logic of authentication. Proc. R. Soc. Lond. A Math. Phys. Sci. 1989, 426, 233–271. [Google Scholar]
- Sierra, J.M.; Hernández, J.C.; Alcaide, A.; Torres, J. Validating the Use of BAN LOGIC. In International Conference on Computational Science and Its Applications; Springer: Berlin/Heidelberg, Germany, 2004; pp. 851–858. [Google Scholar]
- Khan, A.; Lee, S.; Wang, J. Differences in Inter-App Communication Between Android and iOS Systems. Available online: https://aimunkhan.com/papers/Khan_Lee_Wang_IAC.pdf (accessed on 9 November 2020).
- Elish, K.O.; Cai, H.; Barton, D.; Yao, D.; Ryder, B.G. Identifying Mobile Inter-App Communication Risks. IEEE Trans. Mob. Comput. 2020, 19, 90–102. [Google Scholar] [CrossRef]
- OWASP. Open Web Application Security Project (OWASP) Cheat Sheet Series–Cryptographic Storage Cheat Sheet. 2020. Available online: https://cheatsheetseries.owasp.org/cheatsheets/Cryptographic_Storage_Cheat_Sheet.html (accessed on 9 November 2020).
- Barker, E.; Roginsky, A. Transitioning the Use of Cryptographic Algorithms and Key Lengths; Technical Report; National Institute of Standards and Technology: Gaithersburg, MA, USA, 2018. [Google Scholar]
- Flautner, K.; Vincent, H.J.M.; Phillips, A.E.W.; Taylor, R.G. Trusted device. U.S. Patent No. 9,231,765, January 2016. [Google Scholar]
- Farraro, E.J. Mobile Authentication Using a Wearable Device. US Patent No. 9,213,820, 15 December 2015. [Google Scholar]
- Whaley, J.; Somerville, K.W. Identifying and Authenticating Users Based on Passive Factors Determined from Sensor Data. US Patent App. No. 15/600,140, November 2017. [Google Scholar]
- Anjomshoa, F.; Aloqaily, M.; Kantarci, B.; Erol-Kantarci, M.; Schuckers, S. Social Behaviometrics for Personalized Devices in the Internet of Things Era. IEEE Access 2017, 5, 12199–12213. [Google Scholar] [CrossRef]
- Tahavori, M.; Moazami, F. Lightweight and secure PUF-based authenticated key agreement scheme for smart grid. Netw. Appl. 2020, 13, 1616–1628. [Google Scholar] [CrossRef]
- Pérez-Jiménez, M.; Sánchez, B.B.; Migliorini, A.; Alcarria, R. Protecting private communications in cyber-physical systems through physical unclonable functions. Electronics 2019, 8, 390. [Google Scholar] [CrossRef] [Green Version]
- Basin, D.; Cremers, C.; Meier, S. Provably repairing the ISO/IEC 9798 standard for entity authentication 1. J. Comput. Secur. 2013, 21, 817–846. [Google Scholar] [CrossRef] [Green Version]
- Ziauddin, S.; Martin, B. Formal analysis of ISO/IEC 9798-2 authentication standard using AVISPA. In Proceedings of the 2013 Eighth Asia Joint Conference on Information Security, Seoul, Korea, 25–26 July 2013; pp. 108–114. [Google Scholar]
Room2Room|Person | Brother | Sister | Father | Mother |
---|---|---|---|---|
Hall2RoomB | 0.5 | 0.1 | 0.1 | 0.1 |
Hall2RoomG | 0.1 | 0.5 | 0.1 | 0.1 |
Hall2RoomC | 0.1 | 0.1 | 0.5 | 0.5 |
Hall2Bath | 0.2 | 0.2 | 0.2 | 0.2 |
Hall2Kitchen | 0.1 | 0.1 | 0.1 | 0.1 |
RoomB2Hall | 1 | 1 | 1 | 1 |
RoomG2Hall | 1 | 1 | 1 | 1 |
RoomC2Hall | 1 | 1 | 1 | 1 |
Bath2Hall | 1 | 1 | 1 | 1 |
Storage2Kitchen | 1 | 1 | 1 | 1 |
Kitchen2LRoom | 0.5 | 0.5 | 0.5 | 0.3 |
Kitchen2Storage | 0.1 | 0.1 | 0.1 | 0.3 |
Kitchen2Hall | 0.4 | 0.4 | 0.4 | 0.4 |
Laundry2Stairs | 0.5 | 0.5 | 0.5 | 0.5 |
Laundry2LRoom | 0.5 | 0.5 | 0.5 | 0.5 |
LRoom2Laundry | 0.5 | 0.1 | 0.5 | 0.1 |
LRoom2Kitchen | 0.5 | 0.9 | 0.5 | 0.9 |
Stairs2Garage | 0.5 | 0.5 | 0.5 | 0.5 |
Stairs2Laundry | 0.5 | 0.5 | 0.5 | 0.5 |
Garage2Out | 0.5 | 0.5 | 0.3 | 0.1 |
Garage2Stairs | 0.5 | 0.5 | 0.7 | 0.9 |
Out2Garage | 1 | 1 | 1 | 1 |
Test Bed Dataset | Publication Date | Size | State | Event | Aggregated | Description |
---|---|---|---|---|---|---|
casas (dataset #7 [63]) | 2009 | 0.6 MB | x | x | x | |
aras [64] | 2013 | 225 MB | x | |||
domus [65] | 2013 | 536 MB | x | x |
Dataset | #6 [63] | #7 [66] |
---|---|---|
Description | Daily life, 2008 | Daily life, Spring 2009 |
#Residents | 2 | 2 |
Last Updated | 24/05/2010 | 08/07/2014 |
Size data (MB) | 0.6 | 4.6 |
Initial | 24/06/2008 | 02/02/2009 |
Final | 01/07/2008 | 04/04/2009 |
Days | 7 | 61 |
Events/Sensors | 51 | 71 |
Measures | 20952 | 137789 |
Random Forest F1 Score | Brother | Father | Mother | Sister |
---|---|---|---|---|
n hyperparameter | 93 | 60 | 53 | 73 |
all rooms | 59% | 77% | 84% | 63% |
out | 93% | 93% | 96% | 90% |
own room | 70% | 76% | 67% | 73% |
Time (s) | Cloud | Local PC | Local IoT |
---|---|---|---|
Training | 15.18 | 11.99 | 534.49 |
Validation | 8.26 | 9.15 | 186.94 |
Total Time | 23.44 | 21.14 | 721.43 |
MSE | 0.06 | 0.06 | 1.10 |
mean error | 0.25 | 0.25 | 1.05 |
estimated inference time | 0.01 | 0.01 | 0.18 |
Closed and Invasive | Open | Non-Invasive | Open and Non-Invasive | |
---|---|---|---|---|
total time | 7.31 | 4.95 | 5.81 | 3.45 |
time saving (s) | 2.36 | 1.50 | 3.86 | |
time saving | 32% | 21% | 53% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hayashi, V.; Ruggiero, W. Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior. Sensors 2020, 20, 6563. https://doi.org/10.3390/s20226563
Hayashi V, Ruggiero W. Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior. Sensors. 2020; 20(22):6563. https://doi.org/10.3390/s20226563
Chicago/Turabian StyleHayashi, Victor, and Wilson Ruggiero. 2020. "Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior" Sensors 20, no. 22: 6563. https://doi.org/10.3390/s20226563
APA StyleHayashi, V., & Ruggiero, W. (2020). Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior. Sensors, 20(22), 6563. https://doi.org/10.3390/s20226563