Abstract
Recently there has been interesting in short-range communication using audio channels for device pairing and as a self-jamming communication medium. Given that such channels are audible to participants they are considered more resistant to active attacks, i.e. the attack could be distinguished by the participants. In this paper, we investigate the validity of this assumption in the only two practical acoustic self-jamming systems using different modulation schemes. We show that basic overshadowing is possible in these systems using an audio channel and that the attack cannot be effectively detected by the participants.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abu-Mahfouz, A.M., Hancke, G.P.: An efficient distributed localisation algorithm for wireless sensor networks: based on smart reference-selection method. Int. J. Sen. Netw. 13(2), 94–111 (2013)
Achard, F., Savry, O.: A cross layer approach to preserve privacy in RFID ISO/IEC 15693 systems. In: RFID-TA, pp. 85–90. IEEE (2012)
Chung, M., Ilju Ko, I.: Data-sharing method for multi-smart devices at close range. In: Mobile Information Systems (2015)
Fei, H., Chouchang, Y., Guang, G., Radha, P.: A framework to securing RFID transmissions by varying transmitted reader’s power. In: Radio Frequency Identification System Security: RFIDsec 2013 Asia Workshop Proceedings, vol. 11, pp. 57–68. IOS Press (2013)
Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–8 (2009)
Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7(6), 2180–2189 (2008)
Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They can hear your heartbeats noninvasive security for implantable medical devices. ACM SIGCOMM Comput. Commun. Rev. 41(4), 2–13 (2011)
Goodrich, M.T., Sirivianos, M., Solis, J., Soriente, C., Tsudik, G., Uzun, E.: Using audio in secure device pairing. Int. J. Secure. Network. 4(1–2), 57–68 (2009)
Han, G., Liu, L., Jiang, J., Shu, L., Hancke, G.: Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks. IEEE Trans. Industr. Inf. 13(1), 135–143 (2017)
Hancke, G.P.: Distance-bounding for RFID: effectiveness of ‘terrorist fraud’ in the presence of bit errors. In: IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 91–96 (2012)
Hassanieh, H., Wang, J., Katabi, D., Kohno, T.: Securing RFIDs by randomizing the modulation and channel. In: 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2015), pp. 235–249 (2015)
Hu, Q., Dinca, L.M., Hancke, G.: Device synchronisation: a practical limitation on reader assisted jamming methods for RFID confidentiality. In: Akram, R.N., Jajodia, S. (eds.) WISTP 2015. LNCS, vol. 9311, pp. 219–234. Springer, Cham (2015). doi:10.1007/978-3-319-24018-3_14
Hu, Q., Dinca, L.M., Yang, A., Hancke, G.: Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization. Comput. Netw. 105, 224–236 (2016)
Jin, R., Zeng, K.: SecNFC: securing inductively-coupled near field communication at physical layer. In: IEEE Conference on Communications and Network Security (CNS), pp. 149–157. IEEE (2015)
Kumar, A., Hancke, G.P.: A zigbee-based animal health monitoring system. IEEE Sens. J. 15(1), 610–617 (2015)
Nandakumar, R., Chintalapudi, K.K., Padmanabhan, V., Venkatesan, R.: Dhwani Secure peer-to-peer acoustic NFC. SIGCOMM Comput. Commun. Rev. 43(4), 63–74 (2013)
Negi, R., Goel, S. Secret communication using artificial noise. In: IEEE 62nd Vehicular Technology Conference, VTC-2005-Fall, vol. 3, pp. 1906–1910 (2005)
Opperman, C.A., Hancke, G.P.: Using NFC-enabled phones for remote data acquisition and digital control. AFRICON 2011, 1–6 (2011)
Pöpper, C., Tippenhauer, N.O., Danev, B., Capkun, S.: Investigation of signal and message manipulations on the wireless channel. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 40–59. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23822-2_3
Potter, C.H., Hancke, G.P., Silva, B.J.: Machine-to-machine: possible applications in industrial networks. In: IEEE International Conference on Industrial Technology (ICIT), pp. 1321–1326 (2013)
Savry, O., Pebay-Peyroula, F., Dehmas, F., Robert, G., Reverdy, J.: RFID noisy reader how to prevent from eavesdropping on the communication? In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 334–345. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_23
Shen, W., Liu, Y., He, X., Dai, H., Ning, P.: No time to demodulate-fast physical layer verification of friendly jamming. In: Military Communications Conference, MILCOM 2015–2015 IEEE, pp. 653–658. IEEE (2015)
Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: human-assisted pure audio device pairing. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 385–400. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85886-7_27
Steinmetzer, D., Schulz, M., Hollick, M.: Lockpicking physical layer key exchange weak adversary models invite the thief. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p. 1. ACM (2015)
Stuart, J.R.: Noise methods for estimating detectability and threshold. J. Audio Eng. Soc. 42(3), 124–140 (1994)
Tippenhauer, N.O., Malisa, L., Ranganathan, A., Capkun, S.: On limitations of friendly jamming for confidentiality. In: IEEE Symposium on Security and Privacy, pp. 160–173. IEEE Computer Society (2013)
Wyner, A.D.: The wire-tap channel. Bell System Technical Journal, The 54(8), 1355–1387 (1975)
Zhang, B., Zhan, Q., Chen, S., Li, M., Ren, K., Wang, C., Ma, D.: Enabling keyless secure acoustic communication for smartphones. Internet of Things Journal, IEEE 1(1), 33–45 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Hu, Q., Hancke, G. (2017). Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks. In: Hancke, G., Markantonakis, K. (eds) Radio Frequency Identification and IoT Security. RFIDSec 2016. Lecture Notes in Computer Science(), vol 10155. Springer, Cham. https://doi.org/10.1007/978-3-319-62024-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-62024-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-62023-7
Online ISBN: 978-3-319-62024-4
eBook Packages: Computer ScienceComputer Science (R0)