Security analysis of emerging smart home applications 11.2016
Final ppt
1. Priwhisper : Enabling Keyless Secure
Acoustic
Communication for Smartphones
Project Guide: Project Members:
Mr. S. Narayanan M. Tech., (PH.D). R. Pradeep (412811205064)
R.Vasanth (412811205505)
G. Suresh Kumar (412811205101)
1
Department of Information Technology
SRM Valliammai Engineering College
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
2. ABSTRACT
• Data confidentiality of the existing short-range
communication systems relies on so-called “key-
exchange then encryption” mechanism, which is
inefficient, especially for short communication sessions.
• In our proposed system, Introducing PriWhisper — a
keyless secure acoustic short-range communication
system for smartphones.
• PriWhisper adopts uses start and stop command for
data confidentiality.
• Implemented and evaluated on several android phones
2Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
3. 3Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
• As an application, we develop AcousAuth — a
novel smartphone empowered system for personal
authentication.
4. Literature survey
[1]S. A. P. Jonathan M. Mccune and M. K. Reiter, “Seeing-
is-believing: Using camera phones for human-verifiable
authentication,” in In IEEE Symposium on Security and
Privacy, 2005, pp. 110 124.
• Current mechanisms for authenticating communication
between devices that share no prior context are
inconvenient for ordinary users, without the assistance
of a trusted authority.
• We present and analyse Seeing-Is-Believing (SiB), a
system that utilises 2D barcodes and camera-phones to
implement a visual channel for authentication and
demonstrative identification of devices.
4Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
5. • We apply this visual channel to several problems in
computer security, including authenticated key
exchange between devices that share no prior context,
establishment of the identity of a TCG-compliant
computing platform, and secure device configuration
in the context of a smart home.
5Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
6. [2]R. Kainda, I. Flechais, and A. W. Roscoe, “Usability and
security of out-of-band channels in secure device
pairing protocols,” in SOUPS ’09. ACM, 2009.
• Initiating and bootstrapping secure, yet low-cost, ad-hoc
transactions is an important challenge that needs to be
over-come if the promise of mobile and pervasive
computing is to be fulfilled.
• A number of methods have been proposed for doing
this based on the use of a secondary out-of-band (OOB)
channel that either authenticates information passed
over the normal communication channel or otherwise
establishes an authenticated shared secret which can be
used for subsequent secure communication
6Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
7. EXISTING SYSTEM
The data confidentiality of the existing short-range
communication systems relies on so-called “key
exchange then encryption” mechanism, which is
inefficient, especially for short communication sessions
7Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
8. PROPOSED SYSTEM
• Implementing the sound wave algorithm to transmit
messages in any critical situation
• Demonstrates PriWhisper, it uses start and stop
command to get required data signal and omits other
signals.
• PriWhisper has high efficiency, compatibility, usability
and has one-to-many features.
• This application can be used without Wi-Fi, Data
connection, Bluetooth, it uses only sound waves to
communicate.
8Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
11. HARDWARE REQUIREMENTS
System Simulation:
• Processor : dual core
• Memory Size : 1 GB
• HDD : 250 GB (Minimum)
• Display : 15” SVGA MONITOR
• Operating System : Windows
Real-Time Implementation:
• Devices : Two android phones
• Processor : 1.2 GHz dual-core
• RAM : 1GB
11Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
12. SOFTWARE REQUIREMENTS
System simulation:
• Operating System : Windows 7
• Front End : Java, android
Real-Time Implementation:
• Operating system : Android
12Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
13. MODULES
• Input data
• Transmitting Audio
• Receiving Audio Frequency
• Convert Audio Frequency
13Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
14. Module1
Input data:
– In this module user give the input voice and
the mobile convert the voice audio into
text(data).
14
Human voice
Andriod phones
Convert Voice
to Text(data)
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
15. Module 2
Transmitting Audio
– In this module we transmitting the text(data)
which is converted from the voice by the audio
frequency using mobile speaker.
15
Android
Transmitting
Audio frequency
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
16. Module 3
Receiving Audio Frequency
– In this module their can be many user can receive
the audio frequency through their android mobile
mic.
16
Audio
Frequency
AndroidReceive
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
17. Module4
Convert Audio Frequency
– In this module the android mobile user get convert
the audio frequency to the text(data)
17
Android Phones
Received Audio
Frequency Display the
Text
Convert
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
19. CONCLUSION AND FUTURE WORK
• We designed, implemented and evaluated PriWhisper,
a keyless secure acoustic short-range communication
system for smart phones.
• Its security has been analytically and experimentally
studied, especially against blind signal segmentation
attacks. We also presented AcousAuth as an
application example.
• We will also extend PriWhisper to many other major
smart phone OS’s such as iOS.
19
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
20. REFERENCE
• [1] Google, “Google Wallet,” URL:
http://www.google.com/wallet/ index.html, accessed:
2013-01-01.
• [2] S. Millward, “AliPay’s Mobile Barcode Payments in
China,” URL: http://www.techinasia.com/alipay-
mobile-payments/, accessed: 2013-01-01.
• [3] R. Kim, “PayPal’s Barcode-based Payment Services
in UK,” URL: http://gigaom.com/2012/05/30/ paypal-
rolls-out-barcode-payments-in-the-uk.
20Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
21. • [4] A. P. Jonathan M. Mccune and M. K. Reiter,
“Seeing-is-believing: Using camera phones for
human-verifiable authentication,” in In IEEE
Symposium on Security and Privacy, 2005, pp. 110–
124
• [5] R. Kainda, I. Flechais, and A. W. Roscoe, “Usability
and security of out-of-band channels in secure device
pairing protocols,” in SOUPS ’09. ACM, 2009.
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones 21