SlideShare une entreprise Scribd logo
1  sur  22
Priwhisper : Enabling Keyless Secure
Acoustic
Communication for Smartphones
Project Guide: Project Members:
Mr. S. Narayanan M. Tech., (PH.D). R. Pradeep (412811205064)
R.Vasanth (412811205505)
G. Suresh Kumar (412811205101)
1
Department of Information Technology
SRM Valliammai Engineering College
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
ABSTRACT
• Data confidentiality of the existing short-range
communication systems relies on so-called “key-
exchange then encryption” mechanism, which is
inefficient, especially for short communication sessions.
• In our proposed system, Introducing PriWhisper — a
keyless secure acoustic short-range communication
system for smartphones.
• PriWhisper adopts uses start and stop command for
data confidentiality.
• Implemented and evaluated on several android phones
2Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
3Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
• As an application, we develop AcousAuth — a
novel smartphone empowered system for personal
authentication.
Literature survey
[1]S. A. P. Jonathan M. Mccune and M. K. Reiter, “Seeing-
is-believing: Using camera phones for human-verifiable
authentication,” in In IEEE Symposium on Security and
Privacy, 2005, pp. 110 124.
• Current mechanisms for authenticating communication
between devices that share no prior context are
inconvenient for ordinary users, without the assistance
of a trusted authority.
• We present and analyse Seeing-Is-Believing (SiB), a
system that utilises 2D barcodes and camera-phones to
implement a visual channel for authentication and
demonstrative identification of devices.
4Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
• We apply this visual channel to several problems in
computer security, including authenticated key
exchange between devices that share no prior context,
establishment of the identity of a TCG-compliant
computing platform, and secure device configuration
in the context of a smart home.
5Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
[2]R. Kainda, I. Flechais, and A. W. Roscoe, “Usability and
security of out-of-band channels in secure device
pairing protocols,” in SOUPS ’09. ACM, 2009.
• Initiating and bootstrapping secure, yet low-cost, ad-hoc
transactions is an important challenge that needs to be
over-come if the promise of mobile and pervasive
computing is to be fulfilled.
• A number of methods have been proposed for doing
this based on the use of a secondary out-of-band (OOB)
channel that either authenticates information passed
over the normal communication channel or otherwise
establishes an authenticated shared secret which can be
used for subsequent secure communication
6Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
EXISTING SYSTEM
The data confidentiality of the existing short-range
communication systems relies on so-called “key
exchange then encryption” mechanism, which is
inefficient, especially for short communication sessions
7Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
PROPOSED SYSTEM
• Implementing the sound wave algorithm to transmit
messages in any critical situation
• Demonstrates PriWhisper, it uses start and stop
command to get required data signal and omits other
signals.
• PriWhisper has high efficiency, compatibility, usability
and has one-to-many features.
• This application can be used without Wi-Fi, Data
connection, Bluetooth, it uses only sound waves to
communicate.
8Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
SYSTEM ARCHITECURE
9Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
APPLICATION DIAGRAM
10Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
HARDWARE REQUIREMENTS
System Simulation:
• Processor : dual core
• Memory Size : 1 GB
• HDD : 250 GB (Minimum)
• Display : 15” SVGA MONITOR
• Operating System : Windows
Real-Time Implementation:
• Devices : Two android phones
• Processor : 1.2 GHz dual-core
• RAM : 1GB
11Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
SOFTWARE REQUIREMENTS
System simulation:
• Operating System : Windows 7
• Front End : Java, android
Real-Time Implementation:
• Operating system : Android
12Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
MODULES
• Input data
• Transmitting Audio
• Receiving Audio Frequency
• Convert Audio Frequency
13Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
Module1
Input data:
– In this module user give the input voice and
the mobile convert the voice audio into
text(data).
14
Human voice
Andriod phones
Convert Voice
to Text(data)
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
Module 2
Transmitting Audio
– In this module we transmitting the text(data)
which is converted from the voice by the audio
frequency using mobile speaker.
15
Android
Transmitting
Audio frequency
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
Module 3
Receiving Audio Frequency
– In this module their can be many user can receive
the audio frequency through their android mobile
mic.
16
Audio
Frequency
AndroidReceive
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
Module4
Convert Audio Frequency
– In this module the android mobile user get convert
the audio frequency to the text(data)
17
Android Phones
Received Audio
Frequency Display the
Text
Convert
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
SCREENSHOT
18Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
CONCLUSION AND FUTURE WORK
• We designed, implemented and evaluated PriWhisper,
a keyless secure acoustic short-range communication
system for smart phones.
• Its security has been analytically and experimentally
studied, especially against blind signal segmentation
attacks. We also presented AcousAuth as an
application example.
• We will also extend PriWhisper to many other major
smart phone OS’s such as iOS.
19
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
REFERENCE
• [1] Google, “Google Wallet,” URL:
http://www.google.com/wallet/ index.html, accessed:
2013-01-01.
• [2] S. Millward, “AliPay’s Mobile Barcode Payments in
China,” URL: http://www.techinasia.com/alipay-
mobile-payments/, accessed: 2013-01-01.
• [3] R. Kim, “PayPal’s Barcode-based Payment Services
in UK,” URL: http://gigaom.com/2012/05/30/ paypal-
rolls-out-barcode-payments-in-the-uk.
20Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
• [4] A. P. Jonathan M. Mccune and M. K. Reiter,
“Seeing-is-believing: Using camera phones for
human-verifiable authentication,” in In IEEE
Symposium on Security and Privacy, 2005, pp. 110–
124
• [5] R. Kainda, I. Flechais, and A. W. Roscoe, “Usability
and security of out-of-band channels in secure device
pairing protocols,” in SOUPS ’09. ACM, 2009.
Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones 21
THANK YOU…
22Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones

Contenu connexe

Tendances

Security in Near Field Communication
Security in Near Field CommunicationSecurity in Near Field Communication
Security in Near Field CommunicationVinit Varghese
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor networkMaulik Patel
 
Near field communication
Near field communicationNear field communication
Near field communicationNagesh Mishra
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Tejasvi Kurusetti
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networksBrockanurag
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Securityh_marvin
 
On Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devicesOn Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devicescgvwzq
 
Windows (Phone) 8 NFC App Scenarios
Windows (Phone) 8 NFC App ScenariosWindows (Phone) 8 NFC App Scenarios
Windows (Phone) 8 NFC App ScenariosAndreas Jakl
 
Near field communication
Near field communicationNear field communication
Near field communicationanshu kumari
 
NXP NFC Android Porting Guide_2017.Jun
NXP NFC Android Porting Guide_2017.JunNXP NFC Android Porting Guide_2017.Jun
NXP NFC Android Porting Guide_2017.JunDaniel Chiu
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkGyanendra Prakash
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALASaikiran Panjala
 
Track 1 session 6 - st dev con 2016 - smart badge
Track 1   session 6 - st dev con 2016 - smart badgeTrack 1   session 6 - st dev con 2016 - smart badge
Track 1 session 6 - st dev con 2016 - smart badgeST_World
 

Tendances (20)

Security in Near Field Communication
Security in Near Field CommunicationSecurity in Near Field Communication
Security in Near Field Communication
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
NFC- Standards and Security
NFC- Standards and SecurityNFC- Standards and Security
NFC- Standards and Security
 
Project
ProjectProject
Project
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
On Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devicesOn Relaying NFC Payment Transactions using Android devices
On Relaying NFC Payment Transactions using Android devices
 
Windows (Phone) 8 NFC App Scenarios
Windows (Phone) 8 NFC App ScenariosWindows (Phone) 8 NFC App Scenarios
Windows (Phone) 8 NFC App Scenarios
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NXP NFC Android Porting Guide_2017.Jun
NXP NFC Android Porting Guide_2017.JunNXP NFC Android Porting Guide_2017.Jun
NXP NFC Android Porting Guide_2017.Jun
 
Bluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor NetworkBluetooth Based Smart Sensor Network
Bluetooth Based Smart Sensor Network
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
A1 Presentation
A1 PresentationA1 Presentation
A1 Presentation
 
Webinar on Insider's Insight into NFC
Webinar on Insider's Insight into NFCWebinar on Insider's Insight into NFC
Webinar on Insider's Insight into NFC
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
Track 1 session 6 - st dev con 2016 - smart badge
Track 1   session 6 - st dev con 2016 - smart badgeTrack 1   session 6 - st dev con 2016 - smart badge
Track 1 session 6 - st dev con 2016 - smart badge
 

En vedette

Screeching Weasel Press Release pdf
Screeching Weasel Press Release pdfScreeching Weasel Press Release pdf
Screeching Weasel Press Release pdfKelly McDonald
 
Private Equity report Q2 2014 ENG final
Private Equity report Q2 2014 ENG finalPrivate Equity report Q2 2014 ENG final
Private Equity report Q2 2014 ENG finalAnh, Nguyen Le Hoang
 
Herramientas digitales y pedagógicas para la educación superior .
Herramientas digitales y pedagógicas para la educación superior . Herramientas digitales y pedagógicas para la educación superior .
Herramientas digitales y pedagógicas para la educación superior . Gladys Elena Estrada Díaz
 
Making The Leap From Web To Mobile
Making The Leap From Web To MobileMaking The Leap From Web To Mobile
Making The Leap From Web To MobileKris Mihalic
 
Machine Learning and Data Mining: 06 Clustering: Partitioning
Machine Learning and Data Mining: 06 Clustering: PartitioningMachine Learning and Data Mining: 06 Clustering: Partitioning
Machine Learning and Data Mining: 06 Clustering: PartitioningPier Luca Lanzi
 
An introduction to Laravel Passport
An introduction to Laravel PassportAn introduction to Laravel Passport
An introduction to Laravel PassportMichael Peacock
 
Foros ,Actividades evaluación, Portafolio del Máster Universitario en Formaci...
Foros ,Actividades evaluación, Portafolio del Máster Universitario en Formaci...Foros ,Actividades evaluación, Portafolio del Máster Universitario en Formaci...
Foros ,Actividades evaluación, Portafolio del Máster Universitario en Formaci...CARMEN VIEJO DÍAZ
 
Dany_Maribao_Lesson 2-understanding socialization
Dany_Maribao_Lesson 2-understanding socializationDany_Maribao_Lesson 2-understanding socialization
Dany_Maribao_Lesson 2-understanding socializationdan_maribao
 
Microservice Architecture with CQRS and Event Sourcing
Microservice Architecture with CQRS and Event SourcingMicroservice Architecture with CQRS and Event Sourcing
Microservice Architecture with CQRS and Event SourcingBen Wilcock
 

En vedette (19)

Qué es un tlc
Qué es un tlcQué es un tlc
Qué es un tlc
 
Screeching Weasel Press Release pdf
Screeching Weasel Press Release pdfScreeching Weasel Press Release pdf
Screeching Weasel Press Release pdf
 
Pregnancy
PregnancyPregnancy
Pregnancy
 
mcetaward
mcetawardmcetaward
mcetaward
 
Digital india
Digital indiaDigital india
Digital india
 
Private Equity report Q2 2014 ENG final
Private Equity report Q2 2014 ENG finalPrivate Equity report Q2 2014 ENG final
Private Equity report Q2 2014 ENG final
 
Estructura[1]
 Estructura[1] Estructura[1]
Estructura[1]
 
Herramientas digitales y pedagógicas para la educación superior .
Herramientas digitales y pedagógicas para la educación superior . Herramientas digitales y pedagógicas para la educación superior .
Herramientas digitales y pedagógicas para la educación superior .
 
мои достижения
мои достижениямои достижения
мои достижения
 
Making The Leap From Web To Mobile
Making The Leap From Web To MobileMaking The Leap From Web To Mobile
Making The Leap From Web To Mobile
 
Machine Learning and Data Mining: 06 Clustering: Partitioning
Machine Learning and Data Mining: 06 Clustering: PartitioningMachine Learning and Data Mining: 06 Clustering: Partitioning
Machine Learning and Data Mining: 06 Clustering: Partitioning
 
An introduction to Laravel Passport
An introduction to Laravel PassportAn introduction to Laravel Passport
An introduction to Laravel Passport
 
Matters of State
Matters of StateMatters of State
Matters of State
 
Vincent Ingosi Resume WOTC
Vincent Ingosi Resume WOTCVincent Ingosi Resume WOTC
Vincent Ingosi Resume WOTC
 
Foros ,Actividades evaluación, Portafolio del Máster Universitario en Formaci...
Foros ,Actividades evaluación, Portafolio del Máster Universitario en Formaci...Foros ,Actividades evaluación, Portafolio del Máster Universitario en Formaci...
Foros ,Actividades evaluación, Portafolio del Máster Universitario en Formaci...
 
Dany_Maribao_Lesson 2-understanding socialization
Dany_Maribao_Lesson 2-understanding socializationDany_Maribao_Lesson 2-understanding socialization
Dany_Maribao_Lesson 2-understanding socialization
 
Project soli
Project  soliProject  soli
Project soli
 
Microservice Architecture with CQRS and Event Sourcing
Microservice Architecture with CQRS and Event SourcingMicroservice Architecture with CQRS and Event Sourcing
Microservice Architecture with CQRS and Event Sourcing
 
Final Year Project
Final Year ProjectFinal Year Project
Final Year Project
 

Similaire à Final ppt

EGLA Licensing and Stadson Technologies
EGLA Licensing and Stadson Technologies EGLA Licensing and Stadson Technologies
EGLA Licensing and Stadson Technologies Dr. Edwin Hernandez
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformSatya Harish
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationAVEVA
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsLaurie Lamberth
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSDr. Edwin Hernandez
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
This paper is included in the Proceedings of the 24th USENIX.docx
This paper is included in the Proceedings of the 24th USENIX.docxThis paper is included in the Proceedings of the 24th USENIX.docx
This paper is included in the Proceedings of the 24th USENIX.docxherthalearmont
 
2005 OSGi Alliance The need of an integration platform
2005 OSGi Alliance The need of an integration platform2005 OSGi Alliance The need of an integration platform
2005 OSGi Alliance The need of an integration platformOSGi Alliance
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEEFINALYEARSTUDENTPROJECTS
 

Similaire à Final ppt (20)

EGLA Licensing and Stadson Technologies
EGLA Licensing and Stadson Technologies EGLA Licensing and Stadson Technologies
EGLA Licensing and Stadson Technologies
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
UplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platformUplinQ - qualcomm® smart gateway the home network as a development platform
UplinQ - qualcomm® smart gateway the home network as a development platform
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC Foundation
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of Things
 
R43019698
R43019698R43019698
R43019698
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
This paper is included in the Proceedings of the 24th USENIX.docx
This paper is included in the Proceedings of the 24th USENIX.docxThis paper is included in the Proceedings of the 24th USENIX.docx
This paper is included in the Proceedings of the 24th USENIX.docx
 
2005 OSGi Alliance The need of an integration platform
2005 OSGi Alliance The need of an integration platform2005 OSGi Alliance The need of an integration platform
2005 OSGi Alliance The need of an integration platform
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA NETWORK SECURITY PROJECT Efficient and privacy aware data aggr...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Efficient and privacy aware data agg...
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
 

Final ppt

  • 1. Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones Project Guide: Project Members: Mr. S. Narayanan M. Tech., (PH.D). R. Pradeep (412811205064) R.Vasanth (412811205505) G. Suresh Kumar (412811205101) 1 Department of Information Technology SRM Valliammai Engineering College Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 2. ABSTRACT • Data confidentiality of the existing short-range communication systems relies on so-called “key- exchange then encryption” mechanism, which is inefficient, especially for short communication sessions. • In our proposed system, Introducing PriWhisper — a keyless secure acoustic short-range communication system for smartphones. • PriWhisper adopts uses start and stop command for data confidentiality. • Implemented and evaluated on several android phones 2Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 3. 3Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones • As an application, we develop AcousAuth — a novel smartphone empowered system for personal authentication.
  • 4. Literature survey [1]S. A. P. Jonathan M. Mccune and M. K. Reiter, “Seeing- is-believing: Using camera phones for human-verifiable authentication,” in In IEEE Symposium on Security and Privacy, 2005, pp. 110 124. • Current mechanisms for authenticating communication between devices that share no prior context are inconvenient for ordinary users, without the assistance of a trusted authority. • We present and analyse Seeing-Is-Believing (SiB), a system that utilises 2D barcodes and camera-phones to implement a visual channel for authentication and demonstrative identification of devices. 4Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 5. • We apply this visual channel to several problems in computer security, including authenticated key exchange between devices that share no prior context, establishment of the identity of a TCG-compliant computing platform, and secure device configuration in the context of a smart home. 5Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 6. [2]R. Kainda, I. Flechais, and A. W. Roscoe, “Usability and security of out-of-band channels in secure device pairing protocols,” in SOUPS ’09. ACM, 2009. • Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be over-come if the promise of mobile and pervasive computing is to be fulfilled. • A number of methods have been proposed for doing this based on the use of a secondary out-of-band (OOB) channel that either authenticates information passed over the normal communication channel or otherwise establishes an authenticated shared secret which can be used for subsequent secure communication 6Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 7. EXISTING SYSTEM The data confidentiality of the existing short-range communication systems relies on so-called “key exchange then encryption” mechanism, which is inefficient, especially for short communication sessions 7Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 8. PROPOSED SYSTEM • Implementing the sound wave algorithm to transmit messages in any critical situation • Demonstrates PriWhisper, it uses start and stop command to get required data signal and omits other signals. • PriWhisper has high efficiency, compatibility, usability and has one-to-many features. • This application can be used without Wi-Fi, Data connection, Bluetooth, it uses only sound waves to communicate. 8Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 9. SYSTEM ARCHITECURE 9Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 10. APPLICATION DIAGRAM 10Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 11. HARDWARE REQUIREMENTS System Simulation: • Processor : dual core • Memory Size : 1 GB • HDD : 250 GB (Minimum) • Display : 15” SVGA MONITOR • Operating System : Windows Real-Time Implementation: • Devices : Two android phones • Processor : 1.2 GHz dual-core • RAM : 1GB 11Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 12. SOFTWARE REQUIREMENTS System simulation: • Operating System : Windows 7 • Front End : Java, android Real-Time Implementation: • Operating system : Android 12Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 13. MODULES • Input data • Transmitting Audio • Receiving Audio Frequency • Convert Audio Frequency 13Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 14. Module1 Input data: – In this module user give the input voice and the mobile convert the voice audio into text(data). 14 Human voice Andriod phones Convert Voice to Text(data) Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 15. Module 2 Transmitting Audio – In this module we transmitting the text(data) which is converted from the voice by the audio frequency using mobile speaker. 15 Android Transmitting Audio frequency Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 16. Module 3 Receiving Audio Frequency – In this module their can be many user can receive the audio frequency through their android mobile mic. 16 Audio Frequency AndroidReceive Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 17. Module4 Convert Audio Frequency – In this module the android mobile user get convert the audio frequency to the text(data) 17 Android Phones Received Audio Frequency Display the Text Convert Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 18. SCREENSHOT 18Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 19. CONCLUSION AND FUTURE WORK • We designed, implemented and evaluated PriWhisper, a keyless secure acoustic short-range communication system for smart phones. • Its security has been analytically and experimentally studied, especially against blind signal segmentation attacks. We also presented AcousAuth as an application example. • We will also extend PriWhisper to many other major smart phone OS’s such as iOS. 19 Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 20. REFERENCE • [1] Google, “Google Wallet,” URL: http://www.google.com/wallet/ index.html, accessed: 2013-01-01. • [2] S. Millward, “AliPay’s Mobile Barcode Payments in China,” URL: http://www.techinasia.com/alipay- mobile-payments/, accessed: 2013-01-01. • [3] R. Kim, “PayPal’s Barcode-based Payment Services in UK,” URL: http://gigaom.com/2012/05/30/ paypal- rolls-out-barcode-payments-in-the-uk. 20Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones
  • 21. • [4] A. P. Jonathan M. Mccune and M. K. Reiter, “Seeing-is-believing: Using camera phones for human-verifiable authentication,” in In IEEE Symposium on Security and Privacy, 2005, pp. 110– 124 • [5] R. Kainda, I. Flechais, and A. W. Roscoe, “Usability and security of out-of-band channels in secure device pairing protocols,” in SOUPS ’09. ACM, 2009. Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones 21
  • 22. THANK YOU… 22Priwhisper : Enabling Keyless Secure Acoustic Communication for Smartphones