Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings

Speech-Based Two-Factor Authentication Thwarts Digital Crime

By Jennifer DeLaOsa | August 24, 2018

Share

A team at the University of Alabama at Birmingham (UAB) has proposed a new, secure method for two-factor authentication. The approach utilizes speech signals of wearable devices.

Two-factor authentication tries to stifle digital crime by adding extra layers of security that require more than the standard username and password to gain access to electronics. Researchers have been trying to simply this process for the user, while strengthening its safety. 

In an effort to stop users from typing in a numerical code, an idea has surfaced that centers around ambient noise. The sound can detect distances between the two devices involved in the identity verification process.

However, UAB researchers speak against this technique, and warn devices could be vulnerable to malicious mobile attacks from far-near hackers.

For example, “ones who are remotely located and can guess the victim’s audio environment or make the phone create predictable sounds (e.g., ringers), and those who are in physical proximity of the user,” according to the researchers.

The team proposes a different solution known as the “Listening-Watch” system, which uses a wearable device and random speech sounds.

“Listening-Watch offers two key security features,” says Nitesh Saxena, Ph.D., professor in the UAB College of Arts and Sciences Department of Computer and Information Sciences. “It uses random code encoded into speech to withstand remote attackers. Low-sensitivity microphones found in current wearable devices cannot capture distant sounds, which will thwart proximity attackers.”

According to UAB, a real-world situation using the “Listening-Watch” authentication would utilize an application installed on a wearable device, such as a fitness tracker or smartwatch. After prompted by a message, the device would record and decode browser-played speech sounds. The browser will be on the primary device, and it will consist of short, random code encoded into human speech.

If the wearable’s audio contains the same code, and closely resembles the browser’s audio recording, the login will be successful. Voice recognition is tasked with decoding the speech.

The research is detailed in the paper, “Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks,” published in June at the Association for Computing Machinery Conference on Security and Privacy in Wireless and Mobile Networks.


Filed Under: M2M (machine to machine)

 

Related Articles Read More >

Part 6: IDE and other software for connectivity and IoT design work
Part 4: Edge computing and gateways proliferate for industrial machinery
Part 3: Trends in Ethernet, PoE, IO-Link, HIPERFACE, and single-cable solutions
Machine Learning for Sensors

DESIGN GUIDE LIBRARY

“motion

Enews Sign Up

Motion Control Classroom

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Renishaw next-generation FORTiS™ enclosed linear encoders offer enhanced metrology and reliability for machine tools
  • WAGO’s smartDESIGNER Online Provides Seamless Progression for Projects
  • Epoxy Certified for UL 1203 Standard
  • The Importance of Industrial Cable Resistance to Chemicals and Oils
  • Optimize, streamline and increase production capacity with pallet-handling conveyor systems
  • Global supply needs drive increased manufacturing footprint development

Design World Podcasts

June 12, 2022
How to avoid over engineering a part
See More >
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • Advertising
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Engineering White Papers
  • LEAP AWARDS

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • 3D CAD
    • Electronics • electrical
    • Fastening & Joining
    • Factory automation
    • Linear Motion
    • Motion Control
    • Test & Measurement
    • Sensors
    • Fluid power
  • Learn
    • Ebooks / Tech Tips
    • Engineering Week
    • Future of Design Engineering
    • MC² Motion Control Classrooms
    • Podcasts
    • Videos
    • Webinars
  • LEAP AWARDS
  • Leadership
    • 2022 Voting
    • 2021 Winners
  • Design Guide Library
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Women in Engineering
  • Supplier Listings