Preventing Overshadowing Attacks in Self-Jamming Audio Channels

Recently there has been a growing interest in short-range communication using audio channels for device pairing and as a self-jamming communication medium. Given that such channels are audible to participants they are considered more resistant to active attacks, i.e., the attack signal would be heard by the participants. In this paper, we investigate the validity of this assumption using two prominent acoustic self-jamming systems implementations. We show that basic overshadowing attacks are possible in these systems and that these attacks cannot be effectively detected by the participants if the attacker is close to the receiving device. Finally, we propose a novel physical-layer solution for effectively detecting overshadowing attacks, which can improve state-of-the-art acoustic self-jamming systems by ensuring channel integrity while not requiring fundamental modifications to these schemes.

[1]  Gerhard P. Hancke,et al.  Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization , 2016, Comput. Networks.

[2]  Radha Poovendran,et al.  A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power , 2013, RFIDSec Asia.

[3]  Claudio Soriente,et al.  Using audio in secure device pairing , 2009, Int. J. Secur. Networks.

[4]  B. J. Silva,et al.  Machine-to-Machine: Possible applications in industrial networks , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).

[5]  Claudio Soriente,et al.  HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.

[6]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[7]  Rong Jin,et al.  SecNFC: Securing inductively-coupled Near Field Communication at physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[8]  Srdjan Capkun,et al.  On Limitations of Friendly Jamming for Confidentiality , 2013, 2013 IEEE Symposium on Security and Privacy.

[9]  Jingyi Zhang,et al.  Industrial Cyberphysical Systems: Realizing Cloud-Based Big Data Infrastructures , 2018, IEEE Industrial Electronics Magazine.

[10]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[11]  Gerhard P. Hancke,et al.  Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks , 2016, RFIDSec.

[12]  J. Robert Stuart,et al.  Noise: Methods for Estimating Detectability and Threshold , 1994 .

[13]  Srdjan Capkun,et al.  Physical-layer integrity for wireless messages , 2016, Comput. Networks.

[14]  Matthias Hollick,et al.  Lockpicking physical layer key exchange: weak adversary models invite the thief , 2015, WISEC.

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  Peng Ning,et al.  No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[17]  Ramarathnam Venkatesan,et al.  Dhwani: secure peer-to-peer acoustic NFC , 2013, SIGCOMM.

[18]  Olivier Savry,et al.  A cross layer approach to preserve privacy in RFID ISO/IEC 15693 systems , 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA).

[19]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[20]  Srdjan Capkun,et al.  Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.

[21]  Tadayoshi Kohno,et al.  Securing RFIDs by Randomizing the Modulation and Channel , 2015, NSDI.

[22]  Si Chen,et al.  ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones , 2014, IEEE Internet of Things Journal.