skip to main content
10.1145/2486001.2486037acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Dhwani: secure peer-to-peer acoustic NFC

Published: 27 August 2013 Publication History

Abstract

Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer manner without incurring complex network configuration overheads. However, adoption of NFC-enabled applications has been stymied by the low levels of penetration of NFC hardware. In this paper, we address the challenge of enabling NFC-like capability on the existing base of mobile phones. To this end, we develop Dhwani, a novel, acoustics-based NFC system that uses the microphone and speakers on mobile phones, thus eliminating the need for any specialized NFC hardware. A key feature of Dhwani is the JamSecure technique, which uses self-jamming coupled with self-interference cancellation at the receiver, to provide an information-theoretically secure communication channel between the devices. Our current implementation of Dhwani achieves data rates of up to 2.4 Kbps, which is sufficient for most existing NFC applications.

References

[1]
Wimbeep. https://sites.google.com/site/wimbeep/.
[2]
Zoosh. http://www.naratte.com/.
[3]
Advanced Encryption Standard (AES), Nov 2001. U.S. Federal Information Processing Standard Publication 197, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
[4]
Near Field Communication Interface and Protocol (NFCIP-1), Dec 2004. ECMA-340 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-340.htm.
[5]
NFC-SEC Whitepaper, Dec 2008. http://www.ecma-international.org/activities/Communications/tc47--2008-089.pdf.
[6]
NFC-SEC-01: NFC-SEC Cryptography Standard using ECDH and AES, Jun 2010. ECMA-386 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-386.htm.
[7]
NFC-SEC: NFCIP-1 Security Services and Protocol, Jun 2010. ECMA-385 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-385.htm.
[8]
Start-Up Naratte Launches Novel Ultrasonic Near-Field Communications Solution, Jul 2011. http://www.bdti.com/InsideDSP/2011/07/28/Naratte.
[9]
86% of POS terminals in North America will accept NFC payments by 2017, Jun 2012. http://www.nfcworld.com/2012/06/07/316112/berg-86-percent-of-pos-terminals-in-north-america-will-accept-nfc-payments-by-2017/.
[10]
At Villanova University, NFC Technology Being Tested, Mar 2012. http://www.todaysfacilitymanager.com/2012/03/at-villanova-university-nfc-technology-being-tested.
[11]
NFC specialist Tapit to raise US\$8m for international expansion, Jul 2012. http://www.nfcworld.com/2012/07/26/317057/nfc-specialist-tapit-to-raise-us8m-for-international-expansion/.
[12]
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices. In SIGCOMM, 2011.
[13]
E. Haselsteiner and K. Breitfuss. Security in Near Field Communication (NFC). In Workshop on RFID Security, Jul 2006.
[14]
M. Jain, J. I. Choi, T. Kim, D. Bharadia, K. Srinivasan, S. Seth, P. Levis, S. Katti, and P. Sinha. Practical, Real-time, Full Duplex Wireless. In Mobicom, 2011.
[15]
S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Mobicom, 2009.
[16]
H. Kortvedt and S. Mjolsnes. Eavesdropping Near Field Communication. In The Norwegian Information Security Conference (NISK), Nov 2009.
[17]
A. Madhavapeddy, D. Scott, A. Tse, and R. Sharp. Audio Networking: The Forgotten Wireless Technology. IEEE Pervasive Computing, 2005.
[18]
I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. In WiSec, 2009.
[19]
S. Mathur, N. M, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Mobicom, 2008.
[20]
C. E. Shannon. Communication Theory of Secrecy Systems. Bell Systems Technical Journal, 28, Oct 1949.
[21]
A. Wyner. The Wire-Tap Channel. Bell Systems Technical Journal, 54, 1974.

Cited By

View all
  • (2024)Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart DevicesACM Transactions on Sensor Networks10.1145/363112020:3(1-22)Online publication date: 16-Jan-2024
  • (2024)Reliable High Throughput Aerial Acoustic Communication for Mobile NetworkIEEE Transactions on Vehicular Technology10.1109/TVT.2023.333293173:4(5704-5716)Online publication date: Apr-2024
  • (2024)Covert Communication With Acoustic NoiseIEEE/ACM Transactions on Networking10.1109/TNET.2023.328669232:1(207-221)Online publication date: Feb-2024
  • Show More Cited By

Index Terms

  1. Dhwani: secure peer-to-peer acoustic NFC

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
      August 2013
      580 pages
      ISBN:9781450320566
      DOI:10.1145/2486001
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 43, Issue 4
        October 2013
        595 pages
        ISSN:0146-4833
        DOI:10.1145/2534169
        Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 August 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. nfc
      2. security
      3. wireless

      Qualifiers

      • Research-article

      Conference

      SIGCOMM'13
      Sponsor:
      SIGCOMM'13: ACM SIGCOMM 2013 Conference
      August 12 - 16, 2013
      Hong Kong, China

      Acceptance Rates

      SIGCOMM '13 Paper Acceptance Rate 38 of 246 submissions, 15%;
      Overall Acceptance Rate 462 of 3,389 submissions, 14%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)191
      • Downloads (Last 6 weeks)35
      Reflects downloads up to 20 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart DevicesACM Transactions on Sensor Networks10.1145/363112020:3(1-22)Online publication date: 16-Jan-2024
      • (2024)Reliable High Throughput Aerial Acoustic Communication for Mobile NetworkIEEE Transactions on Vehicular Technology10.1109/TVT.2023.333293173:4(5704-5716)Online publication date: Apr-2024
      • (2024)Covert Communication With Acoustic NoiseIEEE/ACM Transactions on Networking10.1109/TNET.2023.328669232:1(207-221)Online publication date: Feb-2024
      • (2024)Towards ISAC-Empowered mmWave Radars by Capturing Modulated VibrationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.344340423:12(13787-13803)Online publication date: Dec-2024
      • (2024)An intensification approach based on fitness landscape characteristics for job shop scheduling problemJournal of Combinatorial Optimization10.1007/s10878-024-01176-047:5Online publication date: 18-May-2024
      • (2023)The Design and Implementation of a Steganographic Communication System over In-Band Acoustical ChannelsACM Transactions on Sensor Networks10.1145/358716219:4(1-25)Online publication date: 10-Jul-2023
      • (2023)mmRipple: Communicating with mmWave Radars through Smartphone VibrationProceedings of the 22nd International Conference on Information Processing in Sensor Networks10.1145/3583120.3586956(149-162)Online publication date: 9-May-2023
      • (2023)AutoProfile: An Intelligent Profile Switching System for SmartphonesIEEE Transactions on Mobile Computing10.1109/TMC.2022.314120522:6(3151-3164)Online publication date: 1-Jun-2023
      • (2023)Acoustic Software Defined Platform: A Versatile Sensing and General Benchmarking PlatformIEEE Transactions on Mobile Computing10.1109/TMC.2021.309325922:2(647-660)Online publication date: 1-Feb-2023
      • (2023)Secure Voice Interactions With Smart DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2021.306998122:1(515-526)Online publication date: 1-Jan-2023
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media