skip to main content
10.1145/3131348.3131355acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Public Access

Secure Information Transfer Between Nearby Wireless Devices

Published: 20 October 2017 Publication History

Abstract

Securely transferring data between two devices that have never previously met nor shared a secret is a difficult task. Previous solutions to the problem are susceptible to well-known attacks or may require extensive infrastructure that may not be suitable for wireless devices such as Internet of Things sensors that do not have advanced computational capabilities. We propose a new approach: using jamming to thwart adversaries located more than a few centimeters away, while still allowing devices in close physical proximity to securely share data. To accomplish this secure data transfer we exploit MIMO antennas and the Inverse-Square Law.

References

[1]
Haithem Al-Mefleh and Osameh Al-Kofahi. Taking advantage of jamming in wireless networks: A survey. Computer Networks, 99:99--124, 2016.
[2]
Marvin Frerking. Digital signal processing in communications systems. Springer Science & Business Media, 2013.
[3]
Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu. They can hear your heartbeats: non-invasive security for implantable medical devices. SIGCOMM Computer Communication Review, 41(4):2--13, August 2011.
[4]
Institute of Electrical and Electronics Engineers. 802.11 standard. Online at http://standards.ieee.org/about/get/802/802.11.html, visited 7/12/2017.
[5]
Timothy J. Pierson, Xiaohui Liang, Ronald Peterson, and David Kotz. Wanda: securely introducing mobile devices. In IEEE International Conference on Computer Communications (INFOCOM), pages 1--9, April 2016.
[6]
Theodore S. Rappaport. Wireless communications: principles and practice. Prentice Hall, 2002.
[7]
Rob van der Meulen. Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015. Online at http://www.gartner.com/newsroom/id/3165317, visited 7/12/2017.

Cited By

View all
  • (2024)TONARI: Reactive Detection of Close Physical Contact Using Unlicensed LPWAN SignalsACM Transactions on Internet of Things10.1145/36485725:2(1-30)Online publication date: 15-Feb-2024
  • (2024)Exploring the applications and security threats of Internet of Thing in the cloud computing paradigmTransactions on Emerging Telecommunications Technologies10.1002/ett.489735:4Online publication date: 8-Apr-2024
  • (2021)Dude, Are You Approaching Me? Detecting Close Physical Contact via Unlicensed LPWAN Signals2021 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCWorkshops50388.2021.9473769(1-6)Online publication date: Jun-2021

Index Terms

  1. Secure Information Transfer Between Nearby Wireless Devices

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    S3 '17: Proceedings of the 9th ACM Workshop on Wireless of the Students, by the Students, and for the Students
    October 2017
    44 pages
    ISBN:9781450351454
    DOI:10.1145/3131348
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 October 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. friendly jamming
    2. secure communications
    3. short range

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    MobiCom '17
    Sponsor:

    Acceptance Rates

    S3 '17 Paper Acceptance Rate 7 of 7 submissions, 100%;
    Overall Acceptance Rate 65 of 93 submissions, 70%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)43
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)TONARI: Reactive Detection of Close Physical Contact Using Unlicensed LPWAN SignalsACM Transactions on Internet of Things10.1145/36485725:2(1-30)Online publication date: 15-Feb-2024
    • (2024)Exploring the applications and security threats of Internet of Thing in the cloud computing paradigmTransactions on Emerging Telecommunications Technologies10.1002/ett.489735:4Online publication date: 8-Apr-2024
    • (2021)Dude, Are You Approaching Me? Detecting Close Physical Contact via Unlicensed LPWAN Signals2021 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCWorkshops50388.2021.9473769(1-6)Online publication date: Jun-2021

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media