SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes

📅 2024-04-23
📈 Citations: 2
Influential: 0
📄 PDF
🤖 AI Summary
To address security vulnerabilities arising from the lack of caller identity authentication during smartphone voice calls—leading to potential leakage of sensitive information—this paper proposes an implicit receiver authentication method leveraging pinna-based echolocation. The approach emits ultrasonic signals via the earpiece and captures user-specific, live biometric echoes reflected by the external ear using the top-mounted microphone, enabling hardware-free, seamless authentication. Innovatively treating the dynamic anatomical structure of the pinna as a live biometric key, the method integrates active ultrasonic sensing, echo signal modeling, time-frequency domain feature extraction, and a lightweight classifier. Evaluated across diverse scenarios, it achieves a mean balanced accuracy of 96.95%, demonstrating robust resistance against replay and spoofing attacks while maintaining high security and usability.

Technology Category

Application Category

📝 Abstract
Receiving calls is one of the most universal functions of smartphones, involving sensitive information and critical operations. Unfortunately, to prioritize convenience, the current call receiving process bypasses smartphone authentication mechanisms (e.g., passwords, fingerprint recognition, and face recognition), leaving a significant security gap. To address this issue, we propose SCR-Auth, a secure call receiver authentication scheme for smartphones that leverages outer ear echoes. It sends inaudible acoustic signals through the earpiece speaker to actively sense the call receiver's outer ear structure and records the resulting echoes using the top microphone. These echoes are then analyzed to extract unique outer ear biometric information for authentication. It operates implicitly, without requiring extra hardware or imposing additional burden. Comprehensive experiments conducted under diverse conditions demonstrate SCR-Auth's effectiveness and security, showing an average balanced accuracy of 96.95% and resilience against potential attacks.
Problem

Research questions and friction points this paper is trying to address.

Mobile Security
Identity Verification
Phone Calls
Innovation

Methods, ideas, or system contributions that make the work stand out.

Acoustic Fingerprinting
Smartphone Security
User Authentication
🔎 Similar Papers
No similar papers found.
Xiping Sun
Xiping Sun
Grasp Lab, University of Pennsylvania
Human and Robot InteractionTactile and HapticWearable SensorMachine Learning
J
Jing Chen
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, 430072, China; Rizhao Institute of Information Technology, Wuhan University, Rizhao, 276800, China
K
Kun He
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, 430072, China
Z
Zhixiang He
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, 430072, China
R
Ruiying Du
Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, 430072, China; Collaborative Innovation Center of Geospatial Technology, Wuhan, 430079, China
Yebo Feng
Yebo Feng
Nanyang Technological University
Computer SecurityNetwork SecurityBlockchain SecurityNetwork Traffic Analysis
Qingchuan Zhao
Qingchuan Zhao
City University of Hong Kong
Mobile securityIoT securityProgram AnalysisReverse Engineering
C
Cong Wu
School of Computer Science and Engineering, Nanyang Technological University, Singapore