Skip to main content

Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks

  • Conference paper
  • First Online:
Radio Frequency Identification and IoT Security (RFIDSec 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10155))

Abstract

Recently there has been interesting in short-range communication using audio channels for device pairing and as a self-jamming communication medium. Given that such channels are audible to participants they are considered more resistant to active attacks, i.e. the attack could be distinguished by the participants. In this paper, we investigate the validity of this assumption in the only two practical acoustic self-jamming systems using different modulation schemes. We show that basic overshadowing is possible in these systems using an audio channel and that the attack cannot be effectively detected by the participants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abu-Mahfouz, A.M., Hancke, G.P.: An efficient distributed localisation algorithm for wireless sensor networks: based on smart reference-selection method. Int. J. Sen. Netw. 13(2), 94–111 (2013)

    Article  Google Scholar 

  2. Achard, F., Savry, O.: A cross layer approach to preserve privacy in RFID ISO/IEC 15693 systems. In: RFID-TA, pp. 85–90. IEEE (2012)

    Google Scholar 

  3. Chung, M., Ilju Ko, I.: Data-sharing method for multi-smart devices at close range. In: Mobile Information Systems (2015)

    Google Scholar 

  4. Fei, H., Chouchang, Y., Guang, G., Radha, P.: A framework to securing RFID transmissions by varying transmitted reader’s power. In: Radio Frequency Identification System Security: RFIDsec 2013 Asia Workshop Proceedings, vol. 11, pp. 57–68. IOS Press (2013)

    Google Scholar 

  5. Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–8 (2009)

    Google Scholar 

  6. Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7(6), 2180–2189 (2008)

    Article  Google Scholar 

  7. Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They can hear your heartbeats noninvasive security for implantable medical devices. ACM SIGCOMM Comput. Commun. Rev. 41(4), 2–13 (2011)

    Article  Google Scholar 

  8. Goodrich, M.T., Sirivianos, M., Solis, J., Soriente, C., Tsudik, G., Uzun, E.: Using audio in secure device pairing. Int. J. Secure. Network. 4(1–2), 57–68 (2009)

    Article  Google Scholar 

  9. Han, G., Liu, L., Jiang, J., Shu, L., Hancke, G.: Analysis of energy-efficient connected target coverage algorithms for industrial wireless sensor networks. IEEE Trans. Industr. Inf. 13(1), 135–143 (2017)

    Article  Google Scholar 

  10. Hancke, G.P.: Distance-bounding for RFID: effectiveness of ‘terrorist fraud’ in the presence of bit errors. In: IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 91–96 (2012)

    Google Scholar 

  11. Hassanieh, H., Wang, J., Katabi, D., Kohno, T.: Securing RFIDs by randomizing the modulation and channel. In: 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2015), pp. 235–249 (2015)

    Google Scholar 

  12. Hu, Q., Dinca, L.M., Hancke, G.: Device synchronisation: a practical limitation on reader assisted jamming methods for RFID confidentiality. In: Akram, R.N., Jajodia, S. (eds.) WISTP 2015. LNCS, vol. 9311, pp. 219–234. Springer, Cham (2015). doi:10.1007/978-3-319-24018-3_14

    Chapter  Google Scholar 

  13. Hu, Q., Dinca, L.M., Yang, A., Hancke, G.: Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization. Comput. Netw. 105, 224–236 (2016)

    Article  Google Scholar 

  14. Jin, R., Zeng, K.: SecNFC: securing inductively-coupled near field communication at physical layer. In: IEEE Conference on Communications and Network Security (CNS), pp. 149–157. IEEE (2015)

    Google Scholar 

  15. Kumar, A., Hancke, G.P.: A zigbee-based animal health monitoring system. IEEE Sens. J. 15(1), 610–617 (2015)

    Article  Google Scholar 

  16. Nandakumar, R., Chintalapudi, K.K., Padmanabhan, V., Venkatesan, R.: Dhwani Secure peer-to-peer acoustic NFC. SIGCOMM Comput. Commun. Rev. 43(4), 63–74 (2013)

    Article  Google Scholar 

  17. Negi, R., Goel, S. Secret communication using artificial noise. In: IEEE 62nd Vehicular Technology Conference, VTC-2005-Fall, vol. 3, pp. 1906–1910 (2005)

    Google Scholar 

  18. Opperman, C.A., Hancke, G.P.: Using NFC-enabled phones for remote data acquisition and digital control. AFRICON 2011, 1–6 (2011)

    Google Scholar 

  19. Pöpper, C., Tippenhauer, N.O., Danev, B., Capkun, S.: Investigation of signal and message manipulations on the wireless channel. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 40–59. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23822-2_3

    Chapter  Google Scholar 

  20. Potter, C.H., Hancke, G.P., Silva, B.J.: Machine-to-machine: possible applications in industrial networks. In: IEEE International Conference on Industrial Technology (ICIT), pp. 1321–1326 (2013)

    Google Scholar 

  21. Savry, O., Pebay-Peyroula, F., Dehmas, F., Robert, G., Reverdy, J.: RFID noisy reader how to prevent from eavesdropping on the communication? In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 334–345. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_23

    Chapter  Google Scholar 

  22. Shen, W., Liu, Y., He, X., Dai, H., Ning, P.: No time to demodulate-fast physical layer verification of friendly jamming. In: Military Communications Conference, MILCOM 2015–2015 IEEE, pp. 653–658. IEEE (2015)

    Google Scholar 

  23. Soriente, C., Tsudik, G., Uzun, E.: HAPADEP: human-assisted pure audio device pairing. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 385–400. Springer, Heidelberg (2008). doi:10.1007/978-3-540-85886-7_27

    Chapter  Google Scholar 

  24. Steinmetzer, D., Schulz, M., Hollick, M.: Lockpicking physical layer key exchange weak adversary models invite the thief. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, p. 1. ACM (2015)

    Google Scholar 

  25. Stuart, J.R.: Noise methods for estimating detectability and threshold. J. Audio Eng. Soc. 42(3), 124–140 (1994)

    Google Scholar 

  26. Tippenhauer, N.O., Malisa, L., Ranganathan, A., Capkun, S.: On limitations of friendly jamming for confidentiality. In: IEEE Symposium on Security and Privacy, pp. 160–173. IEEE Computer Society (2013)

    Google Scholar 

  27. Wyner, A.D.: The wire-tap channel. Bell System Technical Journal, The 54(8), 1355–1387 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  28. Zhang, B., Zhan, Q., Chen, S., Li, M., Ren, K., Wang, C., Ma, D.: Enabling keyless secure acoustic communication for smartphones. Internet of Things Journal, IEEE 1(1), 33–45 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiao Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hu, Q., Hancke, G. (2017). Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks. In: Hancke, G., Markantonakis, K. (eds) Radio Frequency Identification and IoT Security. RFIDSec 2016. Lecture Notes in Computer Science(), vol 10155. Springer, Cham. https://doi.org/10.1007/978-3-319-62024-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62024-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62023-7

  • Online ISBN: 978-3-319-62024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics