Next Article in Journal
EEG Fingerprints under Naturalistic Viewing Using a Portable Device
Next Article in Special Issue
MQTTset, a New Dataset for Machine Learning Techniques on MQTT
Previous Article in Journal
Recognition of Typical Locomotion Activities Based on the Sensor Data of a Smartphone in Pocket or Hand
Previous Article in Special Issue
A New Method of Secure Authentication Based on Electromagnetic Signatures of Chipless RFID Tags and Machine Learning Approaches
Article

Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior

Polytechnic School, University of São Paulo, São Paulo 05508-010, Brazil
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(22), 6563; https://doi.org/10.3390/s20226563
Received: 13 October 2020 / Revised: 10 November 2020 / Accepted: 13 November 2020 / Published: 17 November 2020
(This article belongs to the Special Issue Intelligent and Adaptive Security in Internet of Things)
Smart speakers, such as Alexa and Google Home, support daily activities in smart home environments. Even though voice commands enable friction-less interactions, existing financial transaction authorization mechanisms hinder usability. A non-invasive authorization by leveraging presence and light sensors’ data is proposed in order to replace invasive procedure through smartphone notification. The Coloured Petri Net model was created for synthetic data generation, and one month data were collected in test bed with real users. Random Forest machine learning models were used for smart home behavior information retrieval. The LSTM prediction model was evaluated while using test bed data, and an open dataset from CASAS. The proposed authorization mechanism is based on Physical Unclonable Function usage as a random number generator seed in a Challenge Response protocol. The simulations indicate that the proposed scheme with specialized autonomous device could halve the total response time for low value financial transactions triggered by voice, from 7.3 to 3.5 s in a non-invasive manner, maintaining authorization security. View Full-Text
Keywords: smart home; machine learning; authentication; simulation; test bed smart home; machine learning; authentication; simulation; test bed
Show Figures

Figure 1

MDPI and ACS Style

Hayashi, V.; Ruggiero, W. Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior. Sensors 2020, 20, 6563. https://doi.org/10.3390/s20226563

AMA Style

Hayashi V, Ruggiero W. Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior. Sensors. 2020; 20(22):6563. https://doi.org/10.3390/s20226563

Chicago/Turabian Style

Hayashi, Victor; Ruggiero, Wilson. 2020. "Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior" Sensors 20, no. 22: 6563. https://doi.org/10.3390/s20226563

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop