Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2939918.2939934acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise

Published: 18 July 2016 Publication History

Abstract

Pairing between wireless devices may be secured by the use of an auxiliary channel such as audio, visuals or vibrations. A simple approach to pairing involves one of the devices initiating the transmission of a key, or keying material like a short password, over the auxiliary channel to the other device. A successful pairing is achieved when the receiving device is able to decode the key without any errors while the attacker is unable to eavesdrop the key.
In this paper, we focus on the security of the vibration channel when used for the key transmission. As shown in some recent work, sending the keying material over a clear vibrational channel poses a significant risk of an acoustic side channel attack. Specifically, an adversary can listen onto the acoustic sounds generated by the vibration motor of the sending device and infer the keying material with a high accuracy. To counteract this threat, we propose a novel pairing scheme, called Vibreaker (a ``Vibrating speaker''), that involves active injection of acoustic noise in order to mask the key signal. In this scheme, the sending device artificially injects noise in the otherwise clear audio channel while transmitting the keying material via vibrations. We experiment with several choices for the noise signal and demonstrate that the security of the audio channel is significantly enhanced with Vibreaker when appropriate noise is used. The scheme requires no additional effort by the user, and imposes minimum hardware requirement and hence can be applied to many different contexts, such as pairing of IoT and implanted devices, wearables and other commodity gadgets.

References

[1]
T. Halevi and N. Saxena. On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping. In ACM CCS, 2010.
[2]
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on S&P, 2008.
[3]
R. Kainda, I. Flechais, and A. W. Roscoe. Usability and security of out-of-band channels in secure device pairing protocols. In SOUPS, 2009.
[4]
N. Roy, M. Gowda, and R. R. Choudhury. Ripple: Communicating through physical vibration. In NSDI, 2015.
[5]
N. Saxena, J.-E. Ekberg, K. Kostiainen, and N. Asokan. Secure device pairing based on a visual channel. In IEEE S&P, 2006.
[6]
N. Saxena, M. B. Uddin, J. Voris, and N. Asokan. Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags. In Percom, 2011.
[7]
E. Uzun, K. Karvonen, and N. Asokan. Usability analysis of secure pairing methods. In USEC, 2007.

Cited By

View all
  • (2023)Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual TrackingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329049518(3991-4005)Online publication date: 2023
  • (2023)Secure Device Trust Bootstrapping Against Collaborative Signal Modification AttacksIEEE INFOCOM 2023 - IEEE Conference on Computer Communications10.1109/INFOCOM53939.2023.10229007(1-10)Online publication date: 17-May-2023
  • (2021)Attacks and Defenses for Single-Stage Residue Number System PRNGsIoT10.3390/iot20300202:3(375-400)Online publication date: 25-Jun-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
July 2016
242 pages
ISBN:9781450342704
DOI:10.1145/2939918
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. acoustic side channel attacks
  2. pairing

Qualifiers

  • Short-paper

Funding Sources

  • NSF

Conference

WiSec'16
Sponsor:

Acceptance Rates

WiSec '16 Paper Acceptance Rate 13 of 51 submissions, 25%;
Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)3
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual TrackingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329049518(3991-4005)Online publication date: 2023
  • (2023)Secure Device Trust Bootstrapping Against Collaborative Signal Modification AttacksIEEE INFOCOM 2023 - IEEE Conference on Computer Communications10.1109/INFOCOM53939.2023.10229007(1-10)Online publication date: 17-May-2023
  • (2021)Attacks and Defenses for Single-Stage Residue Number System PRNGsIoT10.3390/iot20300202:3(375-400)Online publication date: 25-Jun-2021
  • (2021)Adversary Models for Mobile Device AuthenticationACM Computing Surveys10.1145/347760154:9(1-35)Online publication date: 8-Oct-2021
  • (2021)Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2020.296903023:1(311-340)Online publication date: Sep-2022
  • (2021)Onboarding New IoT DevicesEvolution of Smart Sensing Ecosystems with Tamper Evident Security10.1007/978-3-030-77764-7_5(37-44)Online publication date: 21-Jun-2021
  • (2020)NDNViber: Vibration-Assisted Automated Bootstrapping of IoT Devices2020 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCWorkshops49005.2020.9145306(1-6)Online publication date: Jun-2020
  • (2019)Evaluation of Ad-hoc Secure Device Pairing Method with Accelerometer and Camera Using MarkerInternational Journal of Networking and Computing10.15803/ijnc.9.2_3189:2(318-338)Online publication date: 2019
  • (2019)On the Difficulty of Using Patient's Physiological Signals in Cryptographic ProtocolsProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3325099(113-122)Online publication date: 28-May-2019
  • (2019)Noisy Vibrational Pairing of IoT DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.287337216:3(530-545)Online publication date: 1-May-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media