skip to main content
10.1145/3412382.3458260acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

Published: 20 May 2021 Publication History

Abstract

Secure Device-to-Device (D2D) communication is becoming increasingly important with the ever-growing number of Internet-of-Things (IoT) devices in our daily life. To achieve secure D2D communication, the key agreement between different IoT devices without any prior knowledge is becoming desirable. Although various approaches have been proposed in the literature, they suffer from a number of limitations, such as low key generation rate and short pairing distance. In this paper, we present InaudibleKey, an inaudible acoustic signal based key generation protocol for mobile devices. Based on acoustic channel reciprocity, InaudibleKey exploits the acoustic channel frequency response of two legitimate devices as a common secret to generating keys. InaudibleKey employs several novel technologies to significantly improve its performance. We conduct extensive experiments to evaluate the proposed system in different real environments. Compared to state-of-the-art works, InaudibleKey improves key generation rate by 3 times, extends pairing distance by 3.2 times, and reduces information reconciliation counts by 2.5 times. Security analysis demonstrates that InaudibleKey is resilient to a number of malicious attacks. We also implement InaudibleKey on modern smartphones and resource-limited IoT devices. Results show that it is energy-efficient and can run on both powerful and resource-limited IoT devices without incurring excessive resource consumption.

References

[1]
[n.d.]. Recommendation for Key Management. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf.
[2]
2019. Attenuation of Sound Waves. https://www.nde-ed.org/EducationResources/CommunityCollege/Ultrasonics/Physics/attenuation.htm.
[3]
Dania Qara Bala and Bhaskaran Raman. 2020. PHY-Based Key Agreement Scheme using Audio Networking. In 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 129--136.
[4]
Burton H Bloom. 1970. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7 (1970), 422--426.
[5]
E.J. Candes and Emmanuel J. 2008. The restricted isometry property and its implications for compressed sensing. Comptes Rendus Mathematique. (2008), 589--592.
[6]
D.L. Donoho. 2006. Compressed sensing. IEEE Transactions on Information Theory (2006), 1289--1306.
[7]
D.L. Donoho and Y. Tsaig. 2008. Fast Solution of ℓ1-Norm Minimization Problems When the Solution May Be Sparse. IEEE Transactions on Information Theory 54, 11 (2008), 4789--4812.
[8]
Matthew Edman, Aggelos Kiayias, and Bülent Yener. 2011. On passive inference attacks against physical-layer key extraction?. In Proceedings of the Fourth European Workshop on System Security. ACM, 8.
[9]
Michael Elad. 2007. Optimized projections for compressed sensing. IEEE Transactions on Signal Processing 55, 12 (2007), 5695--5702.
[10]
Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. 2014. Rappor: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 1054--1067.
[11]
Robyn RM Gershon, Richard Neitzel, Marissa A Barrera, and Muhammad Akram. 2006. Pilot survey of subway and bus stop noise levels. Journal of Urban Health 83, 5 (2006), 802.
[12]
Edward T et al. Hall. 1968. Proxemics [and comments and replies]. Current anthropology 9, 2/3 (1968), 83--108.
[13]
Daniel Halperin, Wenjun Hu, Anmol Sheth, and David Wetherall. 2011. Tool release: Gathering 802.11 n traces with channel state information. ACM SIGCOMM Computer Communication Review 41, 1 (2011), 53--53.
[14]
Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 836--852.
[15]
Masahito Hayashi and Toyohiro Tsurumaru. 2016. More efficient privacy amplification with less random seeds via dual universal hash function. IEEE Transactions on Information Theory 62, 4 (2016), 2213--2232.
[16]
Yitao He, Junyu Bian, Xinyu Tong, Zihui Qian, Wei Zhu, Xiaohua Tian, and Xinbing Wang. 2019. Canceling Inaudible Voice Commands Against Voice Control Systems. In Mobicom. 1--15.
[17]
Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K Kasera, Neal Patwari, and Srikanth V Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Mobicom. ACM, 321--332.
[18]
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-proof: usable two-factor authentication based on ambient sound. In 24th USENIX Security Symposium. 483--498.
[19]
Donguk Lee, Gibbeum Kim, and Woojae Han. 2017. Analysis of Subway Interior Noise at Peak Commuter Time. Journal of audiology & otology 21, 2 (2017), 61.
[20]
Qi Lin, Weitao Xu, Jun Liu, Abdelwahed Khamis, Wen Hu, Mahbub Hassan, and Aruna Seneviratne. 2019. H2B: heartbeat-based secret key generation using piezo vibration sensors. In IPSN. ACM, 265--276.
[21]
Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In INFOCOM. IEEE, 3048--3056.
[22]
Hongbo Liu, Jie Yang, Yan Wang, and Yingying Chen. 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In INFOCOM. IEEE, 927--935.
[23]
Youjing Lu, Fan Wu, Shaojie Tang, Linghe Kong, and Guihai Chen. 2019. FREE: A Fast and Robust Key Extraction Mechanism via Inaudible Acoustic Signal. In Mobihoc. ACM, 311--320.
[24]
Sreekanth Malladi, Jim Alves-Foss, and Robert B Heckendorn. 2002. On preventing replay attacks on security protocols. Technical Report. IDAHO UNIV MOSCOW DEPT OF COMPUTER SCIENCE.
[25]
Suhas Mathur, Robert Miller, Alexander Varshavsky, Wade Trappe, and Narayan Mandayam. 2011. Proximate: proximity-based secure pairing using ambient wireless signals. In Mobisys. ACM, 211--224.
[26]
Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. 2008. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Mobicom. ACM, 128--139.
[27]
Rene Mayrhofer and Hans Gellersen. 2009. Shake well before use: Intuitive and secure pairing of mobile devices. IEEE Transactions on Mobile Computing 8, 6 (2009), 792--806.
[28]
Lili Meng, Jie Liang, Upul Samarawickrama, Yao Zhao, Huihui Bai, and André Kaup. 2014. Multiple description coding with randomly and uniformly offset quantizers. IEEE Transactions on Image Processing 23, 2 (2014), 582--595.
[29]
Markus Miettinen, N Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, and Majid Sobhani. 2014. Context-based zero-interaction pairing and key evolution for advanced personal devices. In CCS. ACM, 880--891.
[30]
Rajalakshmi Nandakumar, Vikram Iyer, Desney Tan, and Shyamnath Gollakota. 2016. Fingerio: Using active sonar for fine-grained finger tracking. In CHI. ACM, 1515--1525.
[31]
Theodore S Rappaport et al. 1996. Wireless communications: principles and practice. Vol. 2. prentice hall PTR New Jersey.
[32]
Marc Roeschlin, Ivan Martinovic, and Kasper Bonne Rasmussen. 2018. Device Pairing at the Touch of an Electrode. In NDSS, Vol. 18. 18--21.
[33]
Masoud Rostami, Ari Juels, and Farinaz Koushanfar. 2013. Heart-to-heart (H2H): authentication for implanted medical devices. In CCS. ACM, 1099--1112.
[34]
Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, and Elaine Barker. 2001. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical Report. Booz-Allen and Hamilton Inc Mclean Va.
[35]
Matthias Schulz, Jakob Link, Francesco Gringoli, and Matthias Hollick. 2018. Shadow Wi-Fi: Teaching smartphones to transmit raw signals and to extract channel state information to implement practical covert channels over Wi-Fi. In Mobisys. 256--268.
[36]
Dominik Schürmann and Stephan Sigg. 2011. Secure communication based on ambient audio. IEEE Transactions on Mobile Computing 12, 2 (2011), 358--370.
[37]
Yiran Shen, Wen Hu, Mingrui Yang, Bo Wei, Simon Lucey, and Chun Tung Chou. 2014. Face recognition on smartphones via optimised sparse representation classification. In IPSN. IEEE Press, 237--248.
[38]
Yiran Shen, Fengyuan Yang, Bowen Du, Weitao Xu, Chengwen Luo, and Hongkai Wen. 2018. Shake-n-Shack: Enabling secure data exchange between smart wearables via handshakes. In PerCom. IEEE, 1--10.
[39]
David Tse and Pramod Viswanath. 2005. Fundamentals of wireless communication. Cambridge university press.
[40]
Alex Varshavsky, Adin Scannell, Anthony LaMarca, and Eyal De Lara. 2007. Amigo: Proximity-based authentication of mobile devices. In Ubicomp. Springer, 253--270.
[41]
John Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary. 2007. Wireless sensor network security: A survey. Security in distributed, grid, mobile, and pervasive computing 1 (2007), 367.
[42]
Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim. 2011. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In INFOCOM. IEEE, 1422--1430.
[43]
Wei Wang, Lin Yang, and Qian Zhang. 2016. Touch-and-guard: secure pairing through hand resonance. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, Heidelberg Germany, 670--681.
[44]
Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, Shaojie Tang, Jizhong Zhao, and Kun Zhao. 2014. KEEP: Fast secret key extraction protocol for D2D communication. In IWQoS. IEEE, 350--359.
[45]
Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, and Jizhong Zhao. 2016. Instant and robust authentication and key agreement among mobile devices. In CCS. ACM, 616--627.
[46]
Pengjin Xie, Jingchao Feng, Zhichao Cao, and Jiliang Wang. 2018. GeneWave: Fast authentication and key agreement on commodity mobile devices. IEEE/ACM Transactions on Networking (TON) 26, 4 (2018), 1688--1700.
[47]
Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2017. Gait-key: A gait-based shared secret key generation protocol for wearable devices. ACM Transactions on Sensor Networks (TOSN) 13, 1 (2017), 6.
[48]
Weitao Xu, Girish Revadigar, Chengwen Luo, Neil Bergmann, and Wen Hu. 2016. Walkie-talkie: Motion-assisted automatic key generation for secure on-body device communication. In IPSN. IEEE, 1--12.
[49]
Weitao Xu, Junqing Zhang, Shunqi Huang, Chengwen Luo, and Wei Li. 2021. Key Generation for Internet of Things: A Contemporary Survey. ACM Computing Surveys (CSUR) 54, 1 (2021), 1--37.
[50]
Wanli Xue, Dinusha Vatsalan, Wen Hu, and Aruna Seneviratne. 2020. Sequence Data Matching and Beyond: New Privacy-preserving Primitives based on Bloom Filters. IEEE Transactions on Information Forensics and Security (2020).
[51]
Lin Yang, Wei Wang, and Qian Zhang. 2016. Secret from muscle: Enabling secure pairing with electromyography. In Sensys. ACM, 28--41.
[52]
Zuyuan Yang, Wei Yan, and Yong Xiang. 2015. On the security of compressed sensing-based signal cryptosystem. IEEE Transactions on Emerging Topics in Computing 3, 3 (2015), 363--371.
[53]
Kai Zeng, Daniel Wu, An Chan, and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In INFOCOM. IEEE, 1--9.
[54]
Junqing Zhang, Trung Q Duong, Alan Marshall, and Roger Woods. 2016. Key generation from wireless channels: A review. Ieee access 4 (2016), 614--626.
[55]
Jiansong Zhang, Zeyu Wang, Zhice Yang, and Qian Zhang. 2017. Proximity based IoT device authentication. In INFOCOM. IEEE, 1--9.
[56]
Kuan Zhang, Patricia Werner, Ming Sun, F Xavier Pi-Sunyer, and Carol N Boozer. 2003. Measurement of human daily physical activity. Obesity research 11, 1 (2003), 33--40.
[57]
Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. 2014. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In CCS. ACM, 429--440.

Cited By

View all

Index Terms

  1. InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IPSN '21: Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021)
      May 2021
      423 pages
      ISBN:9781450380980
      DOI:10.1145/3412382
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 May 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Acoustic signal
      2. Device pairing
      3. Key generation
      4. Mobile devices

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      Conference

      IPSN '21
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 143 of 593 submissions, 24%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)34
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 28 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media