Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks

Recently there has been interesting in short-range communication using audio channels for device pairing and as a self-jamming communication medium. Given that such channels are audible to participants they are considered more resistant to active attacks, i.e. the attack could be distinguished by the participants. In this paper, we investigate the validity of this assumption in the only two practical acoustic self-jamming systems using different modulation schemes. We show that basic overshadowing is possible in these systems using an audio channel and that the attack cannot be effectively detected by the participants.

[1]  Gerhard P. Hancke,et al.  Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization , 2016, Comput. Networks.

[2]  Claudio Soriente,et al.  Using audio in secure device pairing , 2009, Int. J. Secur. Networks.

[3]  Claudio Soriente,et al.  HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.

[4]  Si Chen,et al.  ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones , 2014, IEEE Internet of Things Journal.

[5]  Srdjan Capkun,et al.  Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.

[6]  Peng Ning,et al.  No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[7]  B. J. Silva,et al.  Machine-to-Machine: Possible applications in industrial networks , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).

[8]  Tadayoshi Kohno,et al.  Securing RFIDs by Randomizing the Modulation and Channel , 2015, NSDI.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Srdjan Capkun,et al.  On Limitations of Friendly Jamming for Confidentiality , 2013, 2013 IEEE Symposium on Security and Privacy.

[11]  Matthias Hollick,et al.  Lockpicking physical layer key exchange: weak adversary models invite the thief , 2015, WISEC.

[12]  Gerhard P. Hancke,et al.  Using NFC-enabled phones for remote data acquisition and digital control , 2011, IEEE Africon '11.

[13]  Olivier Savry,et al.  A cross layer approach to preserve privacy in RFID ISO/IEC 15693 systems , 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA).

[14]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[15]  Jacques Reverdy,et al.  RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? , 2007, CHES.

[16]  Gerhard P. Hancke,et al.  Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality , 2015, WISTP.

[17]  Gerhard P. Hancke Distance-bounding for RFID: Effectiveness of ‘terrorist fraud’ in the presence of bit errors , 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA).

[18]  Radha Poovendran,et al.  A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power , 2013, RFIDSec Asia.

[19]  Rong Jin,et al.  SecNFC: Securing inductively-coupled Near Field Communication at physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[20]  Gerhard P. Hancke,et al.  Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[21]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011 .

[22]  IlJu Ko,et al.  Data-Sharing Method for Multi-Smart Devices at Close Range , 2015, Mob. Inf. Syst..

[23]  Gerhard P. Hancke,et al.  A Zigbee-Based Animal Health Monitoring System , 2015, IEEE Sensors Journal.

[24]  Ramarathnam Venkatesan,et al.  Dhwani: secure peer-to-peer acoustic NFC , 2013, SIGCOMM.

[25]  J. Robert Stuart,et al.  Noise: Methods for Estimating Detectability and Threshold , 1994 .

[26]  Gerhard P. Hancke,et al.  An efficient distributed localisation algorithm for wireless sensor networks: based on smart reference-selection method , 2013, Int. J. Sens. Networks.

[27]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[28]  Guangjie Han,et al.  Analysis of Energy-Efficient Connected Target Coverage Algorithms for Industrial Wireless Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.