{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T05:57:10Z","timestamp":1672725430728},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"1","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61902289, 62032005, 61872089, 61771140, 61972096 and U21A20465"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science Foundation of Fujian Provincial Science and Technology Agency","award":["2020J02016, 2018J01782"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2023,2,28]]},"abstract":"To secure communications, this article presents a key extraction scheme for smart devices using ambient sounds. Specifically, it is designed for the scenario when smart devices do not have any pre-loaded secrets. Moreover, it can be implemented when smart devices have no access to the online trusted third party or the Network Time Protocol server. In our scheme, smart devices achieve synchronization by making use of ambient sounds. Then, they calculate and obtain the pairing distance and secure distance by applying a band-pass filter. Completing these operations, two smart devices can directly extract a communication key. We analyze the security of our scheme and evaluate the performance of it by implementing the scheme using a few off-the-shelf devices. The experimental results indicate that compared with related schemes, the bit generation rate of our scheme has significant improvement (increases at least 80%), and it can reach 312 bit\/s.<\/jats:p>","DOI":"10.1145\/3544108","type":"journal-article","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T10:08:22Z","timestamp":1655374102000},"page":"1-20","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Key Extraction Using Ambient Sounds for Smart Devices"],"prefix":"10.1145","volume":"19","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3882-7041","authenticated-orcid":false,"given":"Yuexin","family":"Zhang","sequence":"first","affiliation":[{"name":"Fujian Normal University, Shangjie, Fuzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3118-305X","authenticated-orcid":false,"given":"Fengjuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Shangjie, Fuzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0070-1707","authenticated-orcid":false,"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Shangjie, Fuzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8972-3373","authenticated-orcid":false,"given":"Li","family":"Xu","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Shangjie, Fuzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2606-5406","authenticated-orcid":false,"given":"Ayong","family":"Ye","sequence":"additional","affiliation":[{"name":"Fujian Normal University, Shangjie, Fuzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,8]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.71"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3101115"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100318"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319714"},{"key":"e_1_3_2_8_2","first-page":"483","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Karapanos Nikolaos","year":"2015","unstructured":"Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-Proof: Usable two-factor authentication based on ambient sound. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915). 483\u2013498. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/karapanos."},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326529"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.1011199"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978328"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433202"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488885"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978298"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T11:47:11Z","timestamp":1672660031000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,8]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2,28]]}},"alternative-id":["10.1145\/3544108"],"URL":"https:\/\/doi.org\/10.1145\/3544108","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,8]]},"assertion":[{"value":"2022-02-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}