Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3098243.3098256acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Coresident evil: noisy vibrational pairing in the face of co-located acoustic eavesdropping

Published: 18 July 2017 Publication History

Abstract

An interesting approach to pairing devices involves the use of a vibrational channel, over which the keying material (e.g., a short PIN) is sent. This approach is efficient (only a unidirectional transfer of PIN is needed) and simple (the sending device requires a vibration motor and receiving device requires an accelerometer). However, it has been shown to be susceptible to acoustic emanations usually produced by the vibration motor. Recent research introduced a mechanism to defeat these attacks by attempting to mask the acoustic leakage with deliberate acoustic noises. In this paper, we pursue a systematic investigation of the security of such a "noisy vibrational pairing" mechanism in a strong yet realistic adversarial model where the eavesdropper is co-located with the victim device(s).
Our contributions are two-fold. First, we show that existing noisy vibrational pairing mechanisms - based on white noise as the masking signal - are vulnerable against a co-located eavesdropper (although they may defeat a distant eavesdropper). We build our attack based on standard signal processing and noise filtering techniques, and show that it can result in a complete compromise of pairing security. Second, we propose a defense that bolsters the masking signal with low-frequency audio tones. We present and address the challenges associated with producing such low-frequency sounds with current commodity hardware. We show that our defensive approach can not only resist our above attack but is also robust to more sophisticated, noise filtering and source separation methods when applicable. We also establish that the insertion of low-frequency sounds does not affect the receiving device's capability to sense the vibrations generated by the sending device. The suggested defense may therefore be used to enhance the security of noisy vibrational pairing without affecting its performance on a wide variety of devices.

References

[1]
AmpAudio. 2016. AmpAudio. https://www.ampaudio.com/. (4 2016).
[2]
S Abhishek Anand and Nitesh Saxena. 2016. Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise. In 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '16).
[3]
V. Boyko, P. MacKenzie, and S. Patel. 2000. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In Eurocrypt.
[4]
J Cardoso. 1998. Blind source separations: statistical principles. Proc. IEEE 9, 10 (1998), 2009--2025.
[5]
Andrzej Cichocki, Juha Karhunen, Wlodzimierz Kasprzak, and Ricardo Vigario. 1999. Neural networks for blind separation with unknown number of sources. NeuroComputing 24, 1 (1999), 5593.
[6]
Alexander De Luca, Emanuel von Zezschwitz, Vijay Raghunathan, and Heinrich Humann. 2009. VibraPass-Secure Authentication Based on Shared Lies. In International Conference for Human-Computer Interaction (CHI) (CHI '09).
[7]
A.H.Y. Fiona. 2006. Keyboard Acoustic Triangulation Attack. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.3156&rep=rep1&type=pdf. (2006). Final Year Project.
[8]
guardRFID. 2017. GuardRFID announces Ultra Low Profile Active RFID Tag which includes Motion and Temperature Sensing. http://www.guardrfid.com/news/guardrfid-announces-ultra-low-profile-active-rfid-tag-which-includes-motion-and-temperature. (3 2017).
[9]
Tzipora Halevi and Nitesh Saxena. 2013. Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. In IEEE Transactions on Information Forensics and Security (TIFS).
[10]
A. Hyvarinen. 1999. Fast and Robust Fixed-Point Algorithms for Independent Component Analysis. IEEE Transactions on Neural Networks 10, 3 (1999), 626--634.
[11]
Countryman Associates Inc. 2017. B6 Omnidirectional Lavalier. http://www.countryman.com/b6-omnidirectional-lavalier-microphone. (3 2017).
[12]
JBL. 2016. JBL - Clip Portable Bluetooth Speaker. http://www.bestbuy.com/site/jbl-clip-portable-bluetooth-speaker-purple/6050039.p?id=1219696711027&skuId=6050039. (4 2016).
[13]
Ronald Kainda, Ivan Flechais, and A. W. Roscoe. 2009. Usability and Security of Out-of-band Channels in Secure Device Pairing Protocols. In SOUPS.
[14]
Younghyun Kim, Woo Suk Lee, Vijay Raghunathan, Niraj K. Jha, and Anand Raghunathan. 2015. Vibration-based Secure Side Channel for Medical Devices. In Proceedings of the 52Nd Annual Design Automation Conference (DAC '15).
[15]
Altec Lansing. 2016. Altec Lansing - Mini H2O Bluetooth Speaker. http://www.alteclansing.com/en/al-products/mini-h20-speaker/. (4 2016).
[16]
Motorola. 2017. JBL Soundboost Speaker. https://www.motorola.com/us/products/moto-mods/jbl-soundboost-speaker. (3 2017).
[17]
Nirupam Roy, Mahanth Gowda, and Romit Roy Choudhury. 2015. Ripple: Communicating Through Physical Vibration. In 12th USENIX Symposium on Network Systems Design and Implementation (NSDI '15).
[18]
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris, and N. Asokan. 2011. Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal RFID tags. In IEEE International Conference on Pervasive Computing and Communications (Percom '11).
[19]
SensMaster. 2017. SensMaster's Samui and Boyard available now with cost-effective motion detector. http://www.veryfields.net/active-rfid- tags-with-motion-detector-sensmaster. (3 2017).
[20]
Sony. 2017. Sony SRS-XB2. http://www.sony.com/electronics/wireless-speakers/srs-xb2. (3 2017).
[21]
Utterly Random Techie. 2017. LET'S SAY HELLO MOTO, CEBU! http://www.utterlyrandomtechie.com/lets-say-hello-moto-cebu/. (3 2017).
[22]
Zagg. 2016. Zagg Speaker Case. http://www.zagg.com/us/en_us/cases/iphone-6-case/speaker-case. (4 2016).
[23]
Bingsheng Zhang, Qin Zhan, Si Chen, Muyuan Li, Kui Ren, Cong Wang, and Di Ma. 2014. PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IEEE Internet of Things Journal 1, 1 (2014), 33--45.

Cited By

View all
  • (2024)OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band ChannelsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670876(1-13)Online publication date: 30-Jul-2024
  • (2023)HAT: Secure and Practical Key Establishment for Implantable Medical DevicesProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583646(213-224)Online publication date: 24-Apr-2023
  • (2021)PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your SmartphoneIEEE Access10.1109/ACCESS.2021.31373609(168600-168612)Online publication date: 2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '17: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
July 2017
297 pages
ISBN:9781450350846
DOI:10.1145/3098243
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2017

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

WiSec '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band ChannelsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670876(1-13)Online publication date: 30-Jul-2024
  • (2023)HAT: Secure and Practical Key Establishment for Implantable Medical DevicesProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583646(213-224)Online publication date: 24-Apr-2023
  • (2021)PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your SmartphoneIEEE Access10.1109/ACCESS.2021.31373609(168600-168612)Online publication date: 2021
  • (2020)VibeRingProceedings of the 10th International Conference on the Internet of Things10.1145/3410992.3410995(1-8)Online publication date: 6-Oct-2020
  • (2020)Side-Channel Sensing: Exploiting Side-Channels to Extract Information for Medical Diagnostics and MonitoringIEEE Journal of Translational Engineering in Health and Medicine10.1109/JTEHM.2020.30289968(1-13)Online publication date: 2020
  • (2019)Noisy Vibrational Pairing of IoT DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.287337216:3(530-545)Online publication date: 1-May-2019
  • (2018)SYNCVIBE: Fast and Secure Device Pairing through Physical Vibration on Commodity Smartphones2018 IEEE 36th International Conference on Computer Design (ICCD)10.1109/ICCD.2018.00043(234-241)Online publication date: Oct-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media