{"id":"https://openalex.org/W4231358906","doi":"https://doi.org/10.1504/ijsn.2020.106518","title":"AudioKey: a usable device pairing system using audio signals on smartwatches","display_name":"AudioKey: a usable device pairing system using audio signals on smartwatches","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W4231358906","doi":"https://doi.org/10.1504/ijsn.2020.106518"},"language":"en","primary_location":{"id":"doi:10.1504/ijsn.2020.106518","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijsn.2020.106518","pdf_url":null,"source":{"id":"https://openalex.org/S146340630","display_name":"International Journal of Security and Networks","issn_l":"1747-8405","issn":["1747-8405","1747-8413"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Security and Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020662666","display_name":"Jiacheng Shang","orcid":"https://orcid.org/0000-0003-3695-0991"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiacheng Shang","raw_affiliation_strings":["Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100600528","display_name":"Jie Wu","orcid":"https://orcid.org/0000-0002-3472-1717"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Wu","raw_affiliation_strings":["Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020662666"],"corresponding_institution_ids":["https://openalex.org/I84392919"],"apc_list":null,"apc_paid":null,"fwci":1.41536821,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.87160752,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"15","issue":"1","first_page":"46","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11349","display_name":"Music Technology and Sound Studies","score":0.946399986743927,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/smartwatch","display_name":"Smartwatch","score":0.8385557532310486},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8316301107406616},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6891663074493408},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.677890419960022},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4759385585784912},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.473189115524292},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.4409410357475281},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.4053499102592468},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3831685185432434},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.35691165924072266},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.32670554518699646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24048307538032532},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.16728124022483826},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.14255306124687195}],"concepts":[{"id":"https://openalex.org/C29794715","wikidata":"https://www.wikidata.org/wiki/Q5362345","display_name":"Smartwatch","level":3,"score":0.8385557532310486},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8316301107406616},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6891663074493408},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.677890419960022},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4759385585784912},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.473189115524292},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.4409410357475281},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.4053499102592468},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3831685185432434},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.35691165924072266},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32670554518699646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24048307538032532},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.16728124022483826},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.14255306124687195},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijsn.2020.106518","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijsn.2020.106518","pdf_url":null,"source":{"id":"https://openalex.org/S146340630","display_name":"International Journal of Security and Networks","issn_l":"1747-8405","issn":["1747-8405","1747-8413"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Security and Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2358991869","https://openalex.org/W4285173741","https://openalex.org/W2309292492","https://openalex.org/W1486050759","https://openalex.org/W4285587629","https://openalex.org/W2756171776","https://openalex.org/W2765158217","https://openalex.org/W2971637278","https://openalex.org/W2993132146","https://openalex.org/W2599755607"],"abstract_inverted_index":{"Smartwatches":[0],"are":[1,84],"expected":[2],"to":[3,42,65,129],"replace":[4],"smartphones":[5],"in":[6,144],"some":[7],"applications":[8],"with":[9,55,161],"better":[10],"user":[11],"experience":[12],"because":[13],"of":[14,18,124,158,167,185],"a":[15,37,48,154,170,175,181],"greater":[16],"range":[17],"features":[19],"and":[20,29,68,74,81,120,127],"new":[21],"innovations":[22],"such":[23],"as":[24],"audio":[25,125],"recording,":[26],"activity":[27],"recognition,":[28],"data":[30],"transmission.":[31],"In":[32],"this":[33],"paper,":[34],"we":[35],"develop":[36],"system":[38,59,151],"called":[39],"AudioKey,":[40],"aiming":[41],"pair":[43],"two":[44,96,107],"smartwatches":[45],"by":[46,102],"generating":[47],"unique":[49],"secret":[50,111,172],"key":[51,71,92,112,164,183],"between":[52,106],"them.":[53],"Compared":[54],"existing":[56,78],"works,":[57],"our":[58,150],"does":[60],"not":[61],"need":[62],"extra":[63],"infrastructure":[64],"synchronise":[66],"devices":[67,97],"trigger":[69],"the":[70,77,91,99,104,117,121,135,162],"generation":[72,93,156],"process,":[73],"only":[75,179],"uses":[76],"sensors":[79],"(gyroscope":[80],"microphone)":[82],"that":[83,149],"deployed":[85],"on":[86,95,141],"most":[87],"smartwatches.":[88],"AudioKey":[89],"triggers":[90],"process":[94],"at":[98],"same":[100],"time":[101,122],"detecting":[103],"handshake":[105],"normal":[108],"users.":[109],"A":[110],"is":[113],"extracted":[114],"from":[115],"both":[116],"frequency":[118],"domain":[119,123],"signals":[126],"used":[128],"authenticate":[130],"each":[131],"other":[132],"or":[133],"encrypt":[134],"sensitive":[136],"data.":[137],"Evaluation":[138],"results":[139],"collected":[140],"nine":[142],"volunteers":[143],"three":[145],"different":[146],"scenarios":[147],"show":[148],"can":[152,178],"achieve":[153,180],"bit":[155],"rate":[157,166],"13.4":[159],"bits/s":[160],"mean":[163,182],"agreement":[165,184],"96.7%":[168],"for":[169],"128-bit":[171],"key,":[173],"while":[174],"strong":[176],"attacker":[177],"10.8%.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
