• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Secure Device Management Scheme with Audio-Based Location Distinction in IoT

    2024-02-19 12:03:20HaifengLinXiangfengLiuChenChenZhiboLiuDexinZhaoYiwenZhangWeizhuangLiandMingshengCao

    Haifeng Lin,Xiangfeng Liu,Chen Chen,Zhibo Liu,Dexin Zhao,Yiwen Zhang,Weizhuang Li and Mingsheng Cao

    1College of Economics and Management,Nanjing University of Aeronautics and Astronautics,Nanjing,211106,China

    2Chengdu Aircraft Industrial(Group)Co.,Ltd.,Chengdu,610073,China

    3Academy of Military Sciences of PLA,Beijing,100091,China

    4School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu,610054,China

    5Ningbo WebKing Technology Joint Stock Co.,Ltd.,Ningbo,315000,China

    6The Network and Data Security Key Laboratory of Sichuan Province,University of Electronic Science and Technology of China,Chengdu,610054,China

    ABSTRACT

    Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using audio-based location distinction techniques.In the proposed scheme,traditional cryptographic techniques,such as symmetric encryption algorithm,RSA-based signcryption scheme,and audio-based secure transmission,are utilized to provide authentication,non-repudiation,and confidentiality in the information interaction of the management system.Moreover,an audio-based location distinction method is designed to detect the position change of the devices.Specifically,the audio frequency response(AFR)of several frequency points is utilized as a device signature.The device signature has the features as follows.(1)Hardware Signature:different pairs of speaker and microphone have different signatures; (2) Distance Signature: in the same direction,the signatures are different at different distances;and(3)Direction Signature:at the same distance,the signatures are different in different directions.Based on the features above,a movement detection algorithm for device identification and location distinction is designed.Moreover,a secure communication protocol is also proposed by using traditional cryptographic techniques to provide integrity,authentication,and non-repudiation in the process of information interaction between devices,Access Points(APs),and Severs.Extensive experiments are conducted to evaluate the performance of the proposed method.The experimental results show that the proposed method has a good performance in accuracy and energy consumption.

    KEYWORDS

    Acoustic hardware fingerprinting;device management;IoT;location distinction

    1 Introduction

    With the rapid development of emerging technologies (e.g.,5G Communications and beyond[1–3],Artificial Intelligence[4–6],and Information Security[7–9]),the Internet of Things(IoT)have become an important part of people’s life and work which provide people with intelligent,secure and privacy-protected services,such as smart medical care [10,11],smart city [12],and intelligent manufacturing [13,14].As we all know,massive smart devices are extremely important in the IoT,as they undertake a variety of high-precision and difficult tasks[15–17].It is noted that a lot of smart devices in IoT are extremely expensive.To reduce the acquisition cost of smart devices and improve their utilization of them,a large number of smart devices have been realized as mobile and portable[18–21].It is necessary to manage smart devices,such that they can be accurately located when we need them [22–24].Moreover,as the number of IoT nodes continue to increase,the risks associated with malicious attacks on the IoT also continue to rise[25,26].When an IoT device is compromised,it is critical to locate the device among the vast number of IoT devices.However,the mobility and portability of devices have brought great challenges to secure device management[27–29].In the midst of existing challenges,identifying an IoT device and detecting a change in its position are critical challenges in many IoT applications(e.g.,intelligent logistics,intelligent transportation,and intelligent manufacturing[30,31]).

    There are several existing methods to realize the identification and movement detection of devices.In[32],the radio frequency identification devices(RFID)based device tracking method was proposed,in which,RFID tags can be used to identify and track devices.In this method,the devices are attached with an RFID tag,which can be identified by an RFID reader.However,using the RFID-based method requires a large number of readers.This will come at a high cost,as the RFID reader is expensive.In[33],an IoT device management system was designed by using cloud computing to realize the dynamic task scheduling of devices.In [34],a single pixel tracking system is proposed for the microfluidic device monitoring without image processing.Other related works also include [35–37],which considers the secure management of smart devices.However,both of them focus on the security in smart device management and lack device tracking.

    In this paper,a device management scheme is proposed,which includes device identification and movement detection by using audio-based location distinction techniques.In our system,a set of devicesD={Dev1,Dev2,...,Devs} and a set of Access Points (APs)A={AP1,AP2,...,APt} are distributed in different rooms.A sever is included in our system to manage all the devices,such as,recoding the trajectory and current position of each device,and assisting in mutual authentication between device and AP.The APs are responsible for detecting the movement of a device in their rooms,and report it to the sever for tracking devices.Both of the devices and APs are equipped with communication module based on microphone and loudspeaker.It is worth noting that these modules are extremely inexpensive[38].

    The proposed scheme includes three main stages: Device Registration,Position Report,and Location Distinction.We utilize traditional cryptographic techniques to realize the integrity,authentication,and non-repudiation of information transmitted between devices,APs,and Severs.Moreover,the audio-based location distinction method is designed to identify the devices and detect the position change of them.The audio frequency response(AFR)at several frequency points are utilized as the signature of a device[39,40]to identify the devices and detect the movements because of the following features.(1) Hardware Signature: the obtained signatures of different loudspeaker and microphone pairs are difference[41];and(2)Location Signature:the obtained signatures are completely different for different distances in the same direction and the obtained signatures are different for different directions in the same distances.To evaluate the performance of the proposed scheme,extensive experiments are conducted.In our experiments,several mobile phones (i.e.,HUAWEI Mate 40,HUAWEI nova 9pro,and HUAWEI nova 9SE)are used as devices and APs.We selected 31 frequency points ranging from 10 to 16 KHz with steps length of 0.2 KHz in our experiments.Extensive experiments show that the audio-based location distinction method has a good performance in security,accuracy and energy consumption.

    The main contributions of this paper are shown as follows:

    · We propose a secure IoT device management scheme with audio-based location distinction and traditional cryptographic techniques.

    · We design an audio-based location distinction method to identify the IoT devices and detect the position change of them.

    · We conduct extensive experiments to evaluate the performance of the proposed scheme.The results show that our scheme has a good performance in security,accuracy and energy consumption.

    The structure of the paper is as follows.The system model is introduced in Section 2.Section 3 describes the proposed the details of IoT device management scheme.Audio-based location distinction method is discussed in Section 4.The experimental results are pretended in Section 5.Finally,Section 6 concludes this paper.

    2 System Model

    There are three entities involved in our system,as shown in Fig.1,e.g.,IoT device,Access Point,and Sever.Specifically,in the proposed system,there is a set ofdevicesD={Dev1,Dev2,...,Devs},which are distributed in different rooms.There is also a set of Access Points (APs)A={AP1,AP2,...,APt},where each room is equipped with an AP for identifying and monitoring devices.Moreover,aseveris included in our system to manage all the devices,e.g.,recoding the trajectory and current position of each device,assisting in mutual authentication between device and AP,etc.The main objective of this paper is that,the APs are responsible for detecting the movement of a device in their rooms,and report it to sever for tracking.

    The audio frequency response(AFR)at several frequency points is used as the location signature of a device for movement detection.It is necessary to introduce the acoustic propagation model.As sound wave is a kind of energy,its energy will gradually decline with the increase of the transmission distance owing to the diffusion,absorption and scattering,when it propagates in certain medium.Actually,the received energy is related to the propagation distance,the gain of the built-in loudspeaker at sender and the built-in microphone at receiver,and the frequency of the sound wave.The acoustic attenuation model is shown as follows:

    wheredis the distance from the sound source,fis the acoustic frequency,Pt(f) is the audio transmission power,Pr(d,f)is the audio frequency receiving power,Lr(f)is the loss of the microphone,Lt(f) is the loss of loudspeaker,nfis the attenuation factor independent of distance and related to frequency,expis the exponential function.

    Figure 1 :The system model

    The audio frequency response(AFR)at frequency pointfcan be defined as:

    It is clear that the frequency response atfis a function of the distance between the sender and receiver,and loss at the microphone and loudspeaker.Accordingly,the set of frequency response{AFR(f1),...,AFR(fn)}at different frequency pointsf1,f2,...,andfncan be regarded as the hybrid signature of location and audio-hardware fingerprints.However,it is difficult for a receiver to obtain the audio transmission powerPt(fi).To solve the problem,the audio signalAudSigtransmitted by sender for hybrid signature extraction can be fixed during the location distinction phase.In this case,the vector

    can be used as the hybrid signature.

    In our system,it is assumed that there is an adversary who is equipped with loudspeaker and microphone.The adversary can obtain all the parameters of the proposed system,know the position of a target IoT device,and access to such devices.The adversary can record the sound of the target IoT device with its loudspeaker,and launch replay attacks with its microphone through adaptive selection of the appropriate positions to trick the AP into recognizing it as the target IoT device.

    3 The Proposed Scheme

    3.1 Device Registration

    Assumed that there is a device manager who has a handhold smart terminal device(e.g.,a mobile phone) and is in charge of assisting device registration during the registration phase and inputting basic information of the devices into the server database.The manager and server have a pair of public/private key(PKM,SKM)and(PKS,SKS),respectively.

    In order to register a new deviceDevnewwith IDIDDevin the system,the manager and the sever perform the following steps:

    Step 1.The manager first transmits the identification numberIDM(resp.IDDev) of the manager(resp.the device),time stampT0,and basic information of deviceBasicInf(e.g.,model,function,price,manufacturer,etc.) to the sever with the handhold smart terminal device by using symmetric encryption algorithm AES[42]and RSA-based signcryption scheme RSA-TBOS[43]as follows:

    · DefiningM=<IDM‖IDDev‖T0‖BasicInf>,the manager sends encrypted registration information

    to the sever,whereEncKsecis the encoding algorithm of AES with secret keyKsec,hash(·) is a hash function,andSignCryis the signcryption algorithm of RSA-TBOS.

    Step 2.After receiving registration informationReg,the Sever performs the following steps to complete registration:

    · The sever checks the validity ofSignCry(Ksec‖hash(M)).

    · If so,the sever can obtain the keyKsecand the hah valueshash(M); if not,the registration is failed.

    · Then,the sever decryptsMfromEncKsec(M),computeshash(M),and checks if the two hash values are equal.

    · If so,the sever chooses an initial section keyK0and transmitsEncKsec(IDDev‖K0)to the manager,and putsMandK0in its database;if not,the registration is failed.

    Step 3.The device manager decryptsIDDev‖K0fromEncKsec(IDDev‖K0),and then transmitsIDDev‖K0toDevnewwith an audio-based secure D2D communication[44,45].The deviceDevnewstores the section keyK0.

    3.2 Position Report

    If a deviceDeviis moved from one room (roomj1) to another room (roomj2),it is required to report it’s position to the Sever through theAPj2in the current room as follows:

    Step 1.Devifirst generates a randomnessR0and transmits the encrypted report informationReptoAPj:

    whereMRep=R0‖IDDeci‖IDAPj1‖Time,IDAPj1is the ID of the AP in the last room,andTimeis the time stamp.IfDeviis in use for the first time,setIDAPj1to null.

    Step 2.After obtainingRepfromDevi,APj2sends

    whereIDAPj2is the ID of the AP in the current room,andSignAPj2(·) is the signature algorithm [46]with it is private key.

    Step 3.When the sever receivedRepSignfromAPj2,it performs the following step to complete the location report.

    · First of all,it verifies the validity of the signatureSignAPj2(hash(IDAPj2‖Rep) withAPj2’s public key.

    · Then,it obtainsMRepandhash(MRep) with current session keyK0ofDeviand checks the consistency between them(if not,returningFailuretoDevithroughAPj2).

    · Finally,it verifies the consistency betweenIDDeci‖R0andMRep.If so,it sends a feedbackEncSK(which includes a new session keyK1forDevi)toDevithroughAPj2(if not,it returnsFailuretoDevithroughAPj2),where

    Step 4.After receivingEncSK,DevidecryptsIDAPj2‖K1andhash(IDAPj2‖K1)with session keyK0,and checks the consistency between them.If so,DevistoresIDAPj2andK1(as the new session key),and sends response

    to sever throughAPj2,in which,R1is a random number;if not,it returnsFailureto sever throughAPj2.

    Step 5.The sever decryptsR1‖IDAPj2andhash(R1‖IDAPj2) fromDevi’s response,and verifies the consistency between them.If so,the sever storesIDAPj2asDevi’s new position,K1as the new session key,andTimeas the time stamp;if not,it reportsFailuretoDevithroughAPj2.

    3.3 Location Distinction

    If the deviceDevihas been moved in roomjand finished the position report,APjneeds to monitor ifDevihas changed its position and report to the sever if a position change ofDevioccurs.In our system,an audio-based location distinction method is proposed,and the framework of the proposed method is shown as follows:

    · Audio Signal Generation.After finishing the position report,Devigenerates an audio signalAudSigand transmits it with it is loudspeaker toAPj.

    · Hybrid Signature Extraction.WhenAPjreceived the audio signal with it’s microphone,it extracts the fingerprints of location and hardware from the received audio signal as a hybrid signature.

    · Movement Detection.Deviintermittently sends the same audio signalAudSigtoAPjfor signature extraction,andAPjcompares current signature with the previous signatures to determine whetherAPjhas been moved.

    For the details of the audio-based location distinction method,please refer to the next section.

    4 Audio-Based Location Distinction Method

    4.1 Location and Audio-Hardware Fingerprints

    From the discussion above,the vectorΦgenerated from the received signal is strong correlated with audio-hardware and location.To verify the theoretic result in a real scenario,three experiments are conducted,in which the selected frequencies are from 10 to 16 KHz with the step length 0.2 KHz,and the transmitted audio signalAudSigis the sum of the sine wave at the selected frequencies(i.e.,10,10.2,...,16 KHz).

    Hardware Signature.In the first experiment,three different smart phones are used to investigate the hardware differences,in which the phoneiequipped withLoudspeakeriandMicrophonei(i=1,2,3).Fig.2 plots the vectorsΦ(L1,M2),Φ(L2,M3) andΦ(L3,M3),whereΦ(Li,Mj) is used to denote the obtained value ofΦwithLoudspeakeriandMicrophonej.As shown in Fig.2,the hardware signatures of different loudspeaker and microphone pairs are very clear difference.

    Location Signature.In the second experiment,two smart phones(i.e.,Phone 1 and Phone 2)are used to study the location differences.Fig.3 plots the vectorsΦ(L1,M2)under four different distances between sender to receiver in the same direction,in which the distances are set to 20,40,60,and 80 cm.From Fig.3,the obtained vectors are completely different in different distances at the same direction.Fig.4 shows the vectorsΦ(L1,M2)in three different directions from receiver in the same distance.It can be seen that the obtained vectors are also different for different directions in the same distances.In summary,location signature of different locations for the same loudspeaker and microphone pair are completely difference.

    Figure 2 :Hardware signature

    4.2 Audio-Based Location Distinction Scheme

    Based on the discussion above,a novel location distinction scheme are proposed by using the AFR.Besides being able to determine whether a node is moving with location signature,the proposed scheme can also resist node impersonation attacks with the audio hardware signature.The details of the proposed scheme is shown as follows:

    Audio Signal Generation.WhenDeviis moved fromroomitoroomj,Deviselects a sequence(α1,α2,...,αN)from[0,1]uniformly at random.And then,Devigenerates an audio signal

    fort∈(0,T],whereφ0is the initial frequency,andf△is the length of step.Here{f0,f1,...,fN}is the set of selected frequencies,in whichfn=φ0+nfΔforn=0,1,...,N.

    Hybrid Signature Extraction.After completing the location report phase,Devitransmits audio signals

    AudSig‖Chirp‖AudSig‖Chirp‖AudSig

    with its loudspeaker toAPj,whereChirpis a chirp signal.Note that,a chirp is a signal in which the frequency increases(called up-chirp)or decreases(called down-chirp)with time.When receiving the audio signals

    with the microphone,APjfirst extractThen,APjcomputes

    fori=0,1,2,whereFFT(·)is fast discrete Fourier transform algorithm,which transforms the signals from time-domain to frequency domain.Finally,APjobtains the hybrid signature as follows:

    Movement Detection.WhenDevisends the same audio signalAudSig‖Chirp‖AudSig‖Chirp‖AudSigtoAPj,APjfirst extracts the corresponding hybrid signature

    whereΦ′iis theFFTresult from(i=0,1,2).ThenAPjcompares the current signatureΦ′with the previous signaturesΦ′with Euclidean distance:

    Ifd(Φ,Φ′) is less than a thresholdΔ,thenDeviis considered to be static; otherwise,Deviis considered to be moved.

    4.3 Evaluation Methodology

    Hypothesis testing is used to decide two hypothesesH0orH1is true when the outcome of the measurements is given [47].Here,a kind of evaluation methodology based on hypothesis testing is discussed to analyse the accuracy of the proposed algorithm.We conduct an experiment to show the distribution of statistics of the Euclidean distance between signatureΦ0ofDeviat time slott0andΦνat time slottνin the same location,whereν=1,...,300,and the distance betweenDeviandAPjis 60 cm.From Fig.5,we can see that the result of this frequency statistic is approximately conforming to Gaussian distribution.

    Figure 5 :The distribution of statistics of the Euclidean distance between two signatures at the same position

    Supposed thatG(μ1,δ20) is the distribution of probability of the distanced(Φloc0(0),Φloc0(ν))between the signature at time slott0in locationloc0and the signature at other time slottνin locationloc0,andG(μ1,δ21) is the distribution of probability of the distanced(Φloc0(0),Φloc1(ν)) between the signature at time slott0in locationloc0and the signature at other time slottνin locationloc1.Note that,the signature ofDeviat locationloc0is different from the signature ofDeviat locationloc0and locationloc1,whereloc0/=loc1.Accordingly,we haveμ1>μ0.The location change detection test can be viewed then as a choice between two eventsH0andH1.

    Then,the false negative probabilityPFNand false positive probabilityPFPcan be expressed as

    In order to evaluate the performance of the proposed scheme,we design an evaluation methodology as follows:

    wherePrecision=TP/(TP+FP),Recall=TP/(TP+FN),TPmeans the number of accurate detection with no movement,andFPandFNare the number of false positive error and false negative error,respectively.Specifically,whenF1is calculated to be 1,it means there is no false negative alarm.

    5 Experimental Verification

    In this section,extensive experiments are conducted to verify the performance of the proposed scheme.

    5.1 Experimental Environment

    In our experiments,several mobile phones (i.e.,HUAWEI Mate 40,HUAWEI nova 9pro,and HUAWEI nova 9SE)are used as devices and APs.Note that,due to the limitation of hardware,the maximum frequency of sound produced by a mobile phone is about 16 KHz.Therefore,it selected 31 frequency points ranging from 10 to 16 KHz with steps length of 0.2 KHz in our experiments.

    The position change diagram of the device in the experiments is shown in the Fig.6.We consider the changing of starting position of the device from the 20 to 100 cm with step-length 20 cm in four different directions,where the AP is on the central position.In other words,there are five points for each direction,and each point is 20,40,60,80,and 100 cm away from the central position.The AP records the sound signal from the device to get the 31 results after FFT transformation for each period of time,and then,calculates the Euclidean distance of link signature according to the obtained value.Moreover,we found that the fading of high frequency band is too fast.In order to average the granularity of each frequency,we refer to the experimental test and influence factors of acoustic attenuation model,and change the frequency weight to exponential growth from low frequency to high frequency.

    Figure 6 :The position change diagram of the device in the experiments

    5.2 Threshold Selection

    First of all,we discuss how to determine the threshold of the proposed location distinction method.From Figs.2–4,we have the conclusion that the location signatures have two properties:the aggregation with time difference and the separation with space difference.The conclusion shows that finding a threshold of movement detection is possible.

    An experiment is conducted to obtain the Euclidean distance of two signatures under different distance change between device and AP with 20 cm as the step length in each direction.As shown in Fig.7,the solid black dot means the Euclidean distance of two signatures of the starting position;the red square means the Euclidean distance of two signatures in the starting position and the position at 20 cm,respectively; the red star means the Euclidean distance of two signatures in the starting position and the position at 40 cm,respectively;the blue triangle means the Euclidean distance of two signatures in the starting position and the position at 60 cm,respectively;the green diamond means the Euclidean distance of two signatures in the starting position and the position at 80 cm,respectively;the black circle means the Euclidean distance of two signatures in the starting position and the position at 100 cm,respectively.From this figure,we can find that the Euclidean distance of two signatures increases as the distance between measured positions increases.

    Figure 7 :Threshold discussion

    In order to obtain a fixed threshold suitable for all distances,theF1score is studied over a varying threshold under different starting positions.As shown in Fig.8,we plot the effect of different threshold increments onF1score under different starting positions.From this figure,it can be seen that,whenΔ=15,F1scores are 1 for different starting positions.It should be noted that,whenΔ=15,the false positive alarm is likely to happen.IfΔis set to be 30,there is only one false positive alarm in all the tests.However,the proposed scheme will be less sensitive to movement perception.For instance,in case that the starting position is 40 cm in direction 1,the proposed scheme can detect a movement when the movement distance is up to 40 cm.

    5.3 Replay Attack Analysis

    Now we discuss the adversary’s replay attacks with an experiment.Assumed that a legitimate device is located 20,40,and 60 cm in direction 1,and an adversary is located at 5 cm before and after these three points.In this experiment,the adversary records and replays the sound of the legitimate device.The experimental result is shown in Fig.9,in which the threshold is set to 15.The blue line combination is the sum of the signature of the legitimate device.We can see in the figure that its separation from the purple and black lines from the recording playback of the adversary.By comparing the threshold with the Euclidean distance between signatures from the legitimate device and adversary,it is found that the attack inefficiency is 100%.This test verifies the proposed scheme can against recording replay attacks.

    Figure 8 :The impact of the value of the threshold on the detection performance

    Figure 9 :Adversary’s replay attacks

    Assumed that the adversary can obtain the original position and the original audio from the legitimate device,an experiment is conduct as follows.A mobile phone is used as the legitimate device at the position 20 cm in direction 1,and another mobile phone is used as the adversary at the position 20 and 2 cm before and after,and 2 cm around.Fig.10 plots the Euclidean distance of the signature of legitimate device and the signature of adversary at different positions in different time slots.In this figure,the middle red line is the threshold.The experimental results show that all attacks failed,although the Euclidean distance between the signature of legitimate device and the signature of adversary at the original position is the closest one to the threshold.

    5.4 Performance

    In order to study the performance of the proposed scheme,an experiment is conducted,in which,the distance between the device and the AP is ±20,±40 and ±60 cm,the movement distance is 5,10 and 20 cm,and the threshold is set to 25,where-20,-40 and-60 cm means the opposite direction of distance 20,40 and 60 cm between the device and the AP,respectively.The experimental results are shown in Fig.11.It can be seen that,the difference of signatures at the same position over different time slots can be confirmed with 100% accuracy.It can also be seen that the accuracy gradually increases with the increasing movement distance,i.e.,a larger movement distance means a more accuracy movement detection.Specifically,it is found that when the movement distance is up to 60 cm,all the device movement can be accurately detected.

    Figure 10 :Attacks analysis when the adversary can obtain the original position and the original audio from the legitimate device

    To further discuss the performance,we test the proposed scheme by selecting three places that are very common in daily life,and the noise level ranged from high to low:restaurants,supermarkets and classrooms.In this experiment,the AP is 100 cm away from the device in the direction 1,and 1000 groups of tests are performed for each place,in which the first 500 groups of talking phones do not move and the last 500 groups of talking phones move 30 cm away.The test results are shown in the Fig.12.It can be seen that,whether in a noisy restaurant or a quiet classroom,the proposed scheme can identify whether a device to move with a 100% probability,which is perfectly in line with the expectation.

    Finally,we conduct an experiment to evaluate the energy consumption compared with several common APPs on mobile phones in the Fig.13.In this experiment,all applications are turned off except the test software.We measure the power consumption of the proposed scheme and other applications (i.e.,NetEases could music,QQ music,QQ,and Microblog) within one hour to verify the efficiency of the software.We can see that the power consumption of the proposed scheme is more than 30 times lower than that of similar music playing software,18 times lower than that of chat tool software,and 40 times lower than that of video and picture browsing software.

    Figure 13 :The energy consumption of the proposed scheme compared with several common APPs

    Discussion.The disadvantage of the proposed scheme is that the transmission of high-frequency sound waves may disturb nearby people.Possible solutions include replacing mixed sine-wave signals with melodious mid-to-high frequency music or using ultrasonic frequencies to send and receive acoustic signals.

    6 Conclusion

    In this paper,a secure device management scheme with audio-based location distinction in IoT has been proposed by utilizing traditional cryptographic techniques.In our scheme,the traditional cryptographic techniques are utilized to realize the integrity,authentication,and non-repudiation of information transmitted between devices,APs,and Severs;and the audio-based location distinction method is designed for identifying the devices,as well as detecting the position change of them.The audio frequency response(AFR)at several frequency points is utilized as the signature of a device to identify the devices and detect the movements.To evaluate the performance of the proposed scheme,extensive experiments are conducted.The experimental results show that the proposed scheme has a good performance in security,accuracy and energy consumption.Future research directions include implementing the designed method using ultrasound and verifying the validity of the method in a real IoT scenario,such as the Internet of Medicine(IoM).

    Acknowledgement:Authors thank editors and reviewers for helping the enrichment of this article.

    Funding Statement:This work is supported by Demonstration of Scientific and Technology Achievements Transform in Sichuan Province under Grant 2022ZHCG0036,National Natural Science Foundation of China(62002047).

    Author Contributions: Study conception and design: Haifeng Lin,Mingsheng Cao; data collection:Xiangfeng Liu,Chen Chen; analysis and interpretation of results: Zhibo Liu,Dexin Zhao; draft manuscript preparation:Yiwen Zhang,Weizhuang Li.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:Not available.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品偷伦视频观看了| 免费高清在线观看日韩| 色94色欧美一区二区| 少妇的逼水好多| 日韩电影二区| 丁香六月天网| 国产爽快片一区二区三区| 久久久精品区二区三区| 99热6这里只有精品| 亚洲欧美清纯卡通| 丝袜美足系列| 免费观看的影片在线观看| 亚洲精品国产av成人精品| 能在线免费看毛片的网站| 最黄视频免费看| 亚洲熟女精品中文字幕| 五月伊人婷婷丁香| 欧美bdsm另类| 国产国语露脸激情在线看| 九九久久精品国产亚洲av麻豆| 日本av免费视频播放| 亚洲熟女精品中文字幕| 欧美日韩视频精品一区| av免费观看日本| 亚洲熟女精品中文字幕| 日韩制服骚丝袜av| 日韩制服骚丝袜av| 国产精品秋霞免费鲁丝片| 日本色播在线视频| 人人妻人人澡人人看| 国产伦精品一区二区三区视频9| 七月丁香在线播放| 国产一区二区在线观看av| 国产国语露脸激情在线看| 七月丁香在线播放| 日韩av免费高清视频| 多毛熟女@视频| 亚洲一区二区三区欧美精品| 黑人欧美特级aaaaaa片| 精品一品国产午夜福利视频| 18禁在线播放成人免费| 国产成人精品久久久久久| 欧美精品亚洲一区二区| 精品久久蜜臀av无| 欧美日韩综合久久久久久| 国产精品麻豆人妻色哟哟久久| 人妻 亚洲 视频| 日日摸夜夜添夜夜添av毛片| 精品少妇黑人巨大在线播放| 在线精品无人区一区二区三| 岛国毛片在线播放| 亚洲欧美精品自产自拍| 一区二区三区精品91| 看非洲黑人一级黄片| 美女国产视频在线观看| 久久久精品94久久精品| 亚洲情色 制服丝袜| 午夜福利视频精品| a 毛片基地| 丝袜在线中文字幕| 国产色爽女视频免费观看| 国产精品不卡视频一区二区| 波野结衣二区三区在线| 三级国产精品欧美在线观看| 美女大奶头黄色视频| 日韩av不卡免费在线播放| 最新的欧美精品一区二区| 视频区图区小说| 一本—道久久a久久精品蜜桃钙片| 午夜久久久在线观看| 成人18禁高潮啪啪吃奶动态图 | videossex国产| 亚洲国产精品成人久久小说| 婷婷成人精品国产| videos熟女内射| 欧美变态另类bdsm刘玥| 免费大片黄手机在线观看| 成人免费观看视频高清| 亚洲av日韩在线播放| 久久久亚洲精品成人影院| 美女主播在线视频| 桃花免费在线播放| 日韩av免费高清视频| 日韩成人av中文字幕在线观看| 插阴视频在线观看视频| 美女内射精品一级片tv| 国产精品一区www在线观看| 午夜91福利影院| 欧美 亚洲 国产 日韩一| 韩国av在线不卡| av在线app专区| 热99久久久久精品小说推荐| 亚洲人成77777在线视频| 三级国产精品欧美在线观看| 国产一区二区三区av在线| 极品人妻少妇av视频| 多毛熟女@视频| 亚洲,一卡二卡三卡| 色婷婷久久久亚洲欧美| 亚洲精品中文字幕在线视频| 涩涩av久久男人的天堂| 赤兔流量卡办理| 性高湖久久久久久久久免费观看| 日本免费在线观看一区| 国产精品成人在线| 色吧在线观看| 91久久精品国产一区二区三区| 91久久精品国产一区二区成人| 一区二区三区乱码不卡18| 午夜激情av网站| 黑人巨大精品欧美一区二区蜜桃 | 夜夜爽夜夜爽视频| 免费看光身美女| 在线免费观看不下载黄p国产| 亚洲欧洲精品一区二区精品久久久 | 丝袜喷水一区| 日韩欧美一区视频在线观看| 人妻制服诱惑在线中文字幕| www.av在线官网国产| 大话2 男鬼变身卡| 大香蕉久久成人网| 日韩不卡一区二区三区视频在线| 九色成人免费人妻av| 一区二区三区四区激情视频| 下体分泌物呈黄色| 久久精品久久久久久久性| 久久久a久久爽久久v久久| 国产精品人妻久久久久久| 色94色欧美一区二区| 久久99一区二区三区| 免费大片黄手机在线观看| 97超碰精品成人国产| 国产色爽女视频免费观看| 18禁观看日本| 久久精品国产亚洲网站| 亚洲国产最新在线播放| 亚洲情色 制服丝袜| 啦啦啦在线观看免费高清www| 成人国产麻豆网| 午夜福利网站1000一区二区三区| 国产伦理片在线播放av一区| 亚洲国产毛片av蜜桃av| 国产亚洲一区二区精品| 热99国产精品久久久久久7| 午夜福利视频精品| av天堂久久9| 亚洲av福利一区| 国产极品粉嫩免费观看在线 | 2022亚洲国产成人精品| 国产av码专区亚洲av| 国产精品.久久久| 色5月婷婷丁香| 欧美老熟妇乱子伦牲交| 高清午夜精品一区二区三区| 久久99蜜桃精品久久| 亚洲一级一片aⅴ在线观看| 国产精品女同一区二区软件| 夜夜骑夜夜射夜夜干| 国产乱来视频区| 大又大粗又爽又黄少妇毛片口| 亚洲成色77777| 日本午夜av视频| 我的女老师完整版在线观看| 伦理电影免费视频| 能在线免费看毛片的网站| 久热久热在线精品观看| 精品一区二区三卡| 日韩熟女老妇一区二区性免费视频| 国产精品国产三级专区第一集| 久久久久久久久大av| 免费大片18禁| 简卡轻食公司| 亚洲少妇的诱惑av| 伊人久久精品亚洲午夜| 国产免费一级a男人的天堂| 亚洲美女视频黄频| 久久久久人妻精品一区果冻| 国模一区二区三区四区视频| 韩国av在线不卡| videos熟女内射| 精品少妇黑人巨大在线播放| 国产女主播在线喷水免费视频网站| 亚洲精品自拍成人| 99热网站在线观看| 视频中文字幕在线观看| 九色亚洲精品在线播放| 精品亚洲成a人片在线观看| 精品少妇黑人巨大在线播放| 国产成人精品无人区| 菩萨蛮人人尽说江南好唐韦庄| 伦理电影免费视频| 日本欧美国产在线视频| 午夜精品国产一区二区电影| 国产不卡av网站在线观看| 永久网站在线| 黄片无遮挡物在线观看| 久久久久久伊人网av| 9色porny在线观看| av女优亚洲男人天堂| 亚洲国产欧美日韩在线播放| 亚洲三级黄色毛片| 成人亚洲欧美一区二区av| 日本色播在线视频| 国产一区亚洲一区在线观看| 久久人人爽av亚洲精品天堂| 老司机亚洲免费影院| 九九爱精品视频在线观看| 国产精品国产av在线观看| 国产免费一级a男人的天堂| 日韩不卡一区二区三区视频在线| 欧美性感艳星| 亚洲国产色片| 免费黄网站久久成人精品| 一区二区日韩欧美中文字幕 | 青春草国产在线视频| 日本欧美视频一区| 高清视频免费观看一区二区| 两个人的视频大全免费| 乱码一卡2卡4卡精品| 一级爰片在线观看| 亚洲欧美色中文字幕在线| 蜜桃久久精品国产亚洲av| 纯流量卡能插随身wifi吗| 国产日韩欧美视频二区| 欧美精品亚洲一区二区| 成年人午夜在线观看视频| 大香蕉97超碰在线| 中文字幕精品免费在线观看视频 | 久久久久久久久久久久大奶| 我的老师免费观看完整版| 寂寞人妻少妇视频99o| 精品熟女少妇av免费看| 一级毛片黄色毛片免费观看视频| 欧美日韩综合久久久久久| 国产熟女欧美一区二区| 久久99精品国语久久久| 久久人人爽人人爽人人片va| 亚洲综合精品二区| 亚洲精品乱码久久久v下载方式| 在线精品无人区一区二区三| 亚洲精品aⅴ在线观看| 97超视频在线观看视频| 大片免费播放器 马上看| 热re99久久精品国产66热6| 蜜桃在线观看..| 亚洲一区二区三区欧美精品| 亚洲欧洲日产国产| 成年人午夜在线观看视频| 黄色欧美视频在线观看| 免费观看av网站的网址| 日日撸夜夜添| 亚洲综合精品二区| 欧美精品高潮呻吟av久久| 在线天堂最新版资源| 久久久久视频综合| 久久久久网色| av在线老鸭窝| 色网站视频免费| 亚洲欧洲国产日韩| 91久久精品国产一区二区成人| 久久久久久久大尺度免费视频| 国产精品99久久久久久久久| 国产熟女午夜一区二区三区 | 日日摸夜夜添夜夜添av毛片| 久久99蜜桃精品久久| 99九九线精品视频在线观看视频| 天堂俺去俺来也www色官网| 午夜福利,免费看| av在线观看视频网站免费| 国产综合精华液| 亚洲精品456在线播放app| 国产精品一区二区三区四区免费观看| 91aial.com中文字幕在线观看| 啦啦啦视频在线资源免费观看| 欧美xxxx性猛交bbbb| 色网站视频免费| 极品人妻少妇av视频| 少妇 在线观看| .国产精品久久| 亚洲欧洲日产国产| 亚洲国产成人一精品久久久| 永久网站在线| 精品久久国产蜜桃| 水蜜桃什么品种好| 日本欧美视频一区| 亚洲无线观看免费| 国产精品蜜桃在线观看| 在线播放无遮挡| 国产一区二区三区av在线| 日本爱情动作片www.在线观看| 亚洲精品乱码久久久v下载方式| 色网站视频免费| 高清av免费在线| 狂野欧美激情性bbbbbb| 久热这里只有精品99| 欧美日韩成人在线一区二区| 久久精品久久精品一区二区三区| 亚洲不卡免费看| 大话2 男鬼变身卡| 91久久精品国产一区二区三区| 久久人人爽人人片av| 成年人免费黄色播放视频| 亚洲av.av天堂| 热99国产精品久久久久久7| 亚洲丝袜综合中文字幕| 日产精品乱码卡一卡2卡三| 丰满迷人的少妇在线观看| 自线自在国产av| 欧美日韩一区二区视频在线观看视频在线| av又黄又爽大尺度在线免费看| 少妇 在线观看| 精品酒店卫生间| 亚州av有码| 美女国产高潮福利片在线看| 蜜桃在线观看..| 视频区图区小说| 最后的刺客免费高清国语| 99久久精品一区二区三区| 国产黄频视频在线观看| 91在线精品国自产拍蜜月| 亚洲精品一区蜜桃| 我的老师免费观看完整版| 黑人欧美特级aaaaaa片| 亚洲人成网站在线播| 制服丝袜香蕉在线| 91久久精品国产一区二区三区| 特大巨黑吊av在线直播| 国产有黄有色有爽视频| 色哟哟·www| 久久久久久久国产电影| 免费观看av网站的网址| 成人影院久久| 中文字幕制服av| 高清午夜精品一区二区三区| 夫妻午夜视频| 久久久精品区二区三区| 夫妻性生交免费视频一级片| av又黄又爽大尺度在线免费看| a 毛片基地| 老司机亚洲免费影院| 久久久久国产精品人妻一区二区| 香蕉精品网在线| 黑丝袜美女国产一区| 777米奇影视久久| 丰满饥渴人妻一区二区三| 成年人免费黄色播放视频| 国产一区二区在线观看av| 曰老女人黄片| 国产探花极品一区二区| 成人黄色视频免费在线看| 亚洲一级一片aⅴ在线观看| 国产在视频线精品| 久久久久久久国产电影| 人妻一区二区av| 亚洲美女视频黄频| 亚洲精品日本国产第一区| 久久av网站| 一区二区av电影网| 国产 精品1| 日日摸夜夜添夜夜添av毛片| 国产一区二区三区av在线| 一区二区三区免费毛片| 午夜免费观看性视频| 91aial.com中文字幕在线观看| 插阴视频在线观看视频| 一区二区日韩欧美中文字幕 | 国产亚洲精品第一综合不卡 | 久久久久久久久久久久大奶| 欧美日韩视频高清一区二区三区二| 国产乱人偷精品视频| 成人毛片60女人毛片免费| av一本久久久久| 久久久久久久大尺度免费视频| 亚洲成人av在线免费| 久久久久人妻精品一区果冻| 丝瓜视频免费看黄片| 高清午夜精品一区二区三区| 激情五月婷婷亚洲| 精品99又大又爽又粗少妇毛片| 一级毛片黄色毛片免费观看视频| 亚洲欧洲精品一区二区精品久久久 | 精品久久久久久久久亚洲| 国产精品久久久久久av不卡| 国产色婷婷99| 日本与韩国留学比较| 国产成人a∨麻豆精品| 80岁老熟妇乱子伦牲交| 国产一区二区三区av在线| 国语对白做爰xxxⅹ性视频网站| 日韩欧美一区视频在线观看| 超色免费av| 精品国产国语对白av| 亚洲精品久久成人aⅴ小说 | 一级二级三级毛片免费看| 老熟女久久久| 日韩av不卡免费在线播放| 卡戴珊不雅视频在线播放| 一级爰片在线观看| 午夜av观看不卡| 中文字幕精品免费在线观看视频 | 18+在线观看网站| 久久久久久久久大av| 秋霞在线观看毛片| 免费av不卡在线播放| 久久ye,这里只有精品| 精品99又大又爽又粗少妇毛片| 满18在线观看网站| 久久久久久久精品精品| 午夜精品国产一区二区电影| 日本-黄色视频高清免费观看| 久久午夜综合久久蜜桃| 亚洲少妇的诱惑av| 日本与韩国留学比较| 日韩欧美精品免费久久| 欧美精品高潮呻吟av久久| 欧美亚洲 丝袜 人妻 在线| 男男h啪啪无遮挡| 国产成人午夜福利电影在线观看| 十分钟在线观看高清视频www| 国产视频内射| 国产免费现黄频在线看| 国产亚洲最大av| 国产高清三级在线| 免费观看a级毛片全部| 亚洲国产色片| 人妻制服诱惑在线中文字幕| 午夜激情久久久久久久| 九九爱精品视频在线观看| 蜜臀久久99精品久久宅男| 一本一本综合久久| www.av在线官网国产| 欧美少妇被猛烈插入视频| 亚洲国产精品国产精品| 成人手机av| 2021少妇久久久久久久久久久| 高清视频免费观看一区二区| 啦啦啦在线观看免费高清www| 中文字幕亚洲精品专区| 婷婷色麻豆天堂久久| 免费观看的影片在线观看| 伊人久久精品亚洲午夜| 黑人猛操日本美女一级片| 久久精品国产a三级三级三级| 成人毛片a级毛片在线播放| 久久国产亚洲av麻豆专区| 亚洲欧美成人精品一区二区| 免费不卡的大黄色大毛片视频在线观看| 另类精品久久| 我的老师免费观看完整版| 69精品国产乱码久久久| 观看av在线不卡| 97精品久久久久久久久久精品| 美女脱内裤让男人舔精品视频| 免费观看无遮挡的男女| 精品少妇黑人巨大在线播放| 久久久久视频综合| 国产爽快片一区二区三区| 国产黄色免费在线视频| 我要看黄色一级片免费的| 五月开心婷婷网| 黄片播放在线免费| 久久婷婷青草| 一本色道久久久久久精品综合| 久久久久久久国产电影| av播播在线观看一区| 亚洲欧美一区二区三区国产| 全区人妻精品视频| 天堂8中文在线网| 80岁老熟妇乱子伦牲交| 最近最新中文字幕免费大全7| 超碰97精品在线观看| 美女大奶头黄色视频| 热99国产精品久久久久久7| 久久女婷五月综合色啪小说| 久久综合国产亚洲精品| 久久精品熟女亚洲av麻豆精品| 国产一区二区在线观看av| 国产精品蜜桃在线观看| 亚洲精品视频女| 欧美日韩国产mv在线观看视频| 黄色一级大片看看| 青青草视频在线视频观看| 国产精品国产av在线观看| 精品久久久久久久久av| tube8黄色片| 亚洲国产精品专区欧美| 九九爱精品视频在线观看| 美女主播在线视频| 国产无遮挡羞羞视频在线观看| 视频在线观看一区二区三区| 亚洲国产精品成人久久小说| 日本黄大片高清| 国产精品久久久久成人av| 国产av码专区亚洲av| 国产成人免费无遮挡视频| 伦精品一区二区三区| 青春草亚洲视频在线观看| 成年女人在线观看亚洲视频| 色吧在线观看| 老女人水多毛片| av免费在线看不卡| 久久精品国产a三级三级三级| 26uuu在线亚洲综合色| 成人二区视频| 国产精品无大码| 久久99热6这里只有精品| 免费高清在线观看视频在线观看| 亚洲国产精品成人久久小说| 亚洲欧美一区二区三区黑人 | 日本免费在线观看一区| 久久 成人 亚洲| 人妻制服诱惑在线中文字幕| 一级二级三级毛片免费看| 午夜视频国产福利| 有码 亚洲区| 一区二区日韩欧美中文字幕 | 婷婷色麻豆天堂久久| 秋霞在线观看毛片| 久久久久久久久久久久大奶| 免费日韩欧美在线观看| 亚洲欧美精品自产自拍| 99久久精品国产国产毛片| av.在线天堂| 女性被躁到高潮视频| 国产成人精品无人区| 国产老妇伦熟女老妇高清| 高清黄色对白视频在线免费看| 丰满少妇做爰视频| 你懂的网址亚洲精品在线观看| 大香蕉97超碰在线| 亚洲欧美精品自产自拍| 国产精品熟女久久久久浪| 制服丝袜香蕉在线| 夜夜骑夜夜射夜夜干| 熟女电影av网| 能在线免费看毛片的网站| 九九在线视频观看精品| 午夜福利影视在线免费观看| 免费高清在线观看日韩| 亚洲色图综合在线观看| 乱码一卡2卡4卡精品| 国产欧美另类精品又又久久亚洲欧美| 极品少妇高潮喷水抽搐| 各种免费的搞黄视频| 精品亚洲成a人片在线观看| 精品一区二区免费观看| 久久久国产欧美日韩av| 18禁裸乳无遮挡动漫免费视频| 亚洲欧美色中文字幕在线| 国产一区亚洲一区在线观看| 国产亚洲精品第一综合不卡 | 各种免费的搞黄视频| 精品久久久噜噜| 少妇的逼好多水| 国产淫语在线视频| 国产亚洲午夜精品一区二区久久| 人妻 亚洲 视频| 久久久久人妻精品一区果冻| 欧美激情 高清一区二区三区| 久久综合国产亚洲精品| 久久久久久久久久成人| 在线观看美女被高潮喷水网站| 日日摸夜夜添夜夜添av毛片| 免费大片18禁| 高清视频免费观看一区二区| 校园人妻丝袜中文字幕| 国产精品一区二区三区四区免费观看| 亚洲,一卡二卡三卡| av有码第一页| 久久韩国三级中文字幕| 蜜桃在线观看..| 日韩成人av中文字幕在线观看| 黄色一级大片看看| videossex国产| 成年美女黄网站色视频大全免费 | 高清午夜精品一区二区三区| 欧美 亚洲 国产 日韩一| 午夜福利网站1000一区二区三区| 51国产日韩欧美| 久久久亚洲精品成人影院| 麻豆乱淫一区二区| 国产午夜精品久久久久久一区二区三区| 蜜桃国产av成人99| 亚洲熟女精品中文字幕| 午夜精品国产一区二区电影| 亚洲国产av影院在线观看| 成人综合一区亚洲| 男女高潮啪啪啪动态图| 久久av网站| 高清不卡的av网站| 国产av码专区亚洲av| 精品一区二区三区视频在线| freevideosex欧美| 中文字幕亚洲精品专区| 久久久久久久久大av| 精品久久久噜噜| 丰满乱子伦码专区| 久久鲁丝午夜福利片| 日韩欧美精品免费久久| 满18在线观看网站| 99热全是精品| 日韩不卡一区二区三区视频在线| 国产日韩欧美亚洲二区| 大片电影免费在线观看免费| 熟女av电影| 久久国产亚洲av麻豆专区| 国产熟女欧美一区二区| 热99国产精品久久久久久7| 边亲边吃奶的免费视频| 51国产日韩欧美| 美女主播在线视频| 又黄又爽又刺激的免费视频.| 色哟哟·www| 人人妻人人爽人人添夜夜欢视频| 精品卡一卡二卡四卡免费|