Audio-Based Security Techniques for Secure Device-to-Device Communications

被引:8
作者
Chen, Dajiang [1 ]
Zhang, Ning [2 ]
Wu, Huici [3 ]
Zhang, Kuan [4 ]
Lu, Rongxing [5 ]
Guizani, Mohsen [6 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Univ Windsor, Windsor, ON, Canada
[3] Beijing Univ Posts & Telecommun BUPT, Beijing, Peoples R China
[4] Univ Nebraska Lincoln, Lincoln, NE USA
[5] Univ New Brunswick, Fredericton, NB, Canada
[6] Mohamed Bin Zayed Univ Artificial Intelligence MBZ, Abu Dhabi, U Arab Emirates
来源
IEEE NETWORK | 2022年 / 36卷 / 06期
关键词
Jamming; Device-to-device communication; Acoustics; Security; Receivers; Microphones; Interference cancellation; MESSAGE AUTHENTICATION;
D O I
10.1109/MNET.005.2100336
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we investigate audio-based security techniques to secure Device-to-Device (D2D) communications. First, the key distribution techniques for secure D2D communication are discussed, which generate the key by using the estimated response of the audio channels between two legitimate devices. Then, keyless D2D secure communication over audio channels is studied by using self-jamming and self-interference cancellation techniques. Furthermore, a novel audio-based secure transmission scheme is proposed by leveraging secure polar code and self-jamming techniques to achieve high efficiency and high level of security. Finally, open research issues of audio-based security are discussed to enhance security of D2D communications.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 15 条
[1]   Physical Layer based Message Authentication with Secure Channel Codes [J].
Chen, Dajiang ;
Zhang, Ning ;
Cheng, Nan ;
Zhang, Kuan ;
Qin, Zhiguang ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) :1079-1093
[2]   Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions [J].
Chen, Dajiang ;
Zhang, Ning ;
Lu, Rongxing ;
Cheng, Nan ;
Zhang, Kuan ;
Qin, Zhiguang .
IEEE NETWORK, 2019, 33 (01) :99-105
[3]   On Physical-Layer Identification of Wireless Devices [J].
Danev, Boris ;
Zanetti, Davide ;
Capkun, Srdjan .
ACM COMPUTING SURVEYS, 2012, 45 (01)
[4]   Preventing Overshadowing Attacks in Self-Jamming Audio Channels [J].
Hu, Qiao ;
Liu, Yuanzhen ;
Yang, Anjia ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) :45-57
[5]   FREE: A Fast and Robust Key Extraction Mechanism via Inaudible Acoustic Signal [J].
Lu, Youjing ;
Wu, Fan ;
Tang, Shaojie ;
Kong, Linghe ;
Chen, Guihai .
PROCEEDINGS OF THE 2019 THE TWENTIETH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC '19), 2019, :311-320
[6]   Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes [J].
Mahdavifar, Hessam ;
Vardy, Alexander .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (10) :6428-6443
[7]   Dhwani: Secure Peer-to-Peer Acoustic NFC [J].
Nandakumar, Rajalakshmi ;
Chintalapudi, Krishna Kant ;
Padmanabhan, Venkata N. ;
Venkatesan, Ramarathnam .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :63-74
[8]   TOWARD HARDWARE-ROOTED SMARTPHONE AUTHENTICATION [J].
Ren, Kui ;
Qin, Zhan ;
Ba, Zhongjie .
IEEE WIRELESS COMMUNICATIONS, 2019, 26 (01) :114-119
[9]   A Survey on Security in D2D Communications [J].
Wang, Mingjun ;
Yan, Zheng .
MOBILE NETWORKS & APPLICATIONS, 2017, 22 (02) :195-208
[10]   Knowledge-Centric Edge Computing Based on Virtualized D2D Communication Systems [J].
Wang, Ruyan ;
Yan, Junjie ;
Wu, Dapeng ;
Wang, Honggang ;
Yang, Qing .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (05) :32-38