Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication

05/18/2020
by   Florentin Putz, et al.
0

Secure Device Pairing (SDP) relies on an out-of-band channel to authenticate devices. This requires a common hardware interface, which limits the use of existing SDP systems. We propose to use short-range acoustic communication for the initial pairing. Audio hardware is commonly available on existing off-the-shelf devices and can be accessed from user space without requiring firmware or hardware modifications. We improve upon previous approaches by designing Acoustic Integrity Codes (AICs): a modulation scheme that provides message authentication on the acoustic physical layer. We analyze their security and demonstrate that we can defend against signal cancellation attacks by designing signals with low autocorrelation. Our system can detect overshadowing attacks using a ternary decision function with a threshold. In our evaluation of this SDP scheme's security and robustness, we achieve a bit error ratio below 0.1 ratio (SNR) of 14 dB. Using our open-source proof-of-concept implementation on Android smartphones, we demonstrate pairing between different smartphone models.

READ FULL TEXT
research
02/03/2022

Double Threshold based Optimal Device Selection Scheme for D2D or Sidelink Network

Device-to-device (D2D) or Sidelink aided communication is regarded as on...
research
01/09/2020

Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges

Short-range audio channels have a few distinguishing characteristics: ea...
research
08/10/2020

NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit

Near-Field Communication (NFC) is being used in a variety of security-cr...
research
03/20/2018

Proximity Verification Based on Acoustic Room Impulse Response

Device proximity verification has a wide range of security applications ...
research
03/26/2019

Hearing your touch: A new acoustic side channel on smartphones

We present the first acoustic side-channel attack that recovers what use...
research
11/14/2017

Physical Layer Authentication for Mission Critical Machine Type Communication using Gaussian Mixture Model based Clustering

The application of Mission Critical Machine Type Communication (MC-MTC) ...
research
12/16/2021

Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems

A whole range of attacks becomes possible when adversaries gain physical...

Please sign up or login with your details

Forgot password? Click here to reset