skip to main content
10.1145/2486001.2486037acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Dhwani: secure peer-to-peer acoustic NFC

Published: 27 August 2013 Publication History

Abstract

Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer manner without incurring complex network configuration overheads. However, adoption of NFC-enabled applications has been stymied by the low levels of penetration of NFC hardware. In this paper, we address the challenge of enabling NFC-like capability on the existing base of mobile phones. To this end, we develop Dhwani, a novel, acoustics-based NFC system that uses the microphone and speakers on mobile phones, thus eliminating the need for any specialized NFC hardware. A key feature of Dhwani is the JamSecure technique, which uses self-jamming coupled with self-interference cancellation at the receiver, to provide an information-theoretically secure communication channel between the devices. Our current implementation of Dhwani achieves data rates of up to 2.4 Kbps, which is sufficient for most existing NFC applications.

References

[1]
Wimbeep. https://sites.google.com/site/wimbeep/.
[2]
Zoosh. http://www.naratte.com/.
[3]
Advanced Encryption Standard (AES), Nov 2001. U.S. Federal Information Processing Standard Publication 197, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
[4]
Near Field Communication Interface and Protocol (NFCIP-1), Dec 2004. ECMA-340 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-340.htm.
[5]
NFC-SEC Whitepaper, Dec 2008. http://www.ecma-international.org/activities/Communications/tc47--2008-089.pdf.
[6]
NFC-SEC-01: NFC-SEC Cryptography Standard using ECDH and AES, Jun 2010. ECMA-386 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-386.htm.
[7]
NFC-SEC: NFCIP-1 Security Services and Protocol, Jun 2010. ECMA-385 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-385.htm.
[8]
Start-Up Naratte Launches Novel Ultrasonic Near-Field Communications Solution, Jul 2011. http://www.bdti.com/InsideDSP/2011/07/28/Naratte.
[9]
86% of POS terminals in North America will accept NFC payments by 2017, Jun 2012. http://www.nfcworld.com/2012/06/07/316112/berg-86-percent-of-pos-terminals-in-north-america-will-accept-nfc-payments-by-2017/.
[10]
At Villanova University, NFC Technology Being Tested, Mar 2012. http://www.todaysfacilitymanager.com/2012/03/at-villanova-university-nfc-technology-being-tested.
[11]
NFC specialist Tapit to raise US\$8m for international expansion, Jul 2012. http://www.nfcworld.com/2012/07/26/317057/nfc-specialist-tapit-to-raise-us8m-for-international-expansion/.
[12]
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices. In SIGCOMM, 2011.
[13]
E. Haselsteiner and K. Breitfuss. Security in Near Field Communication (NFC). In Workshop on RFID Security, Jul 2006.
[14]
M. Jain, J. I. Choi, T. Kim, D. Bharadia, K. Srinivasan, S. Seth, P. Levis, S. Katti, and P. Sinha. Practical, Real-time, Full Duplex Wireless. In Mobicom, 2011.
[15]
S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Mobicom, 2009.
[16]
H. Kortvedt and S. Mjolsnes. Eavesdropping Near Field Communication. In The Norwegian Information Security Conference (NISK), Nov 2009.
[17]
A. Madhavapeddy, D. Scott, A. Tse, and R. Sharp. Audio Networking: The Forgotten Wireless Technology. IEEE Pervasive Computing, 2005.
[18]
I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. In WiSec, 2009.
[19]
S. Mathur, N. M, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Mobicom, 2008.
[20]
C. E. Shannon. Communication Theory of Secrecy Systems. Bell Systems Technical Journal, 28, Oct 1949.
[21]
A. Wyner. The Wire-Tap Channel. Bell Systems Technical Journal, 54, 1974.

Cited By

View all

Index Terms

  1. Dhwani: secure peer-to-peer acoustic NFC

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
      August 2013
      580 pages
      ISBN:9781450320566
      DOI:10.1145/2486001
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 43, Issue 4
        October 2013
        595 pages
        ISSN:0146-4833
        DOI:10.1145/2534169
        Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 August 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. nfc
      2. security
      3. wireless

      Qualifiers

      • Research-article

      Conference

      SIGCOMM'13
      Sponsor:
      SIGCOMM'13: ACM SIGCOMM 2013 Conference
      August 12 - 16, 2013
      Hong Kong, China

      Acceptance Rates

      SIGCOMM '13 Paper Acceptance Rate 38 of 246 submissions, 15%;
      Overall Acceptance Rate 462 of 3,389 submissions, 14%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)186
      • Downloads (Last 6 weeks)34
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media