Approaches for Audible Acoustic Communication

From SoniControl Wiki
Jump to: navigation, search
Name Description Comment Links
A. Madhavapeddy, D. Scott, A. Tse, and R. Sharp, ―Audio Networking: The forgotten wireless technology,‖ IEEE Pervasive Computing, vol. 4, no. 3, pp. 55–60, July 2005. In this article, we'll review various modulation schemes we've worked with previously, covering how to transfer data to nearby smart phones as well as usability and security issues. We'll consider audio networking as a mechanism for introducing data packets into ongoing mobile phone calls. We'll also discuss some real-world problems reported with telephone conferencing and apply audio-networking techniques to them in a case study application http://ieeexplore.ieee.org/abstract/document/1495392/
H. Yan, S. Zhou, Z. J. Shi, and B. Li, ―A DSP implementation of OFDM acoustic modem,‖ in Proc. Second Workshop on Underwater Networks, New York, USA: ACM, 2007, pp. 89–92. The success of multicarrier modulation in the form of OFDM in radio channels illuminates a path one could take towards high-rate underwater acoustic communications, and recently there are intensive investigations on underwater OFDM. In this paper, we implement the acoustic OFDM transmitter and receiver design of [4,5] on a TMS320C6713 DSP board. We analyze the workload and identify the most time-consuming operations. Based on the workload analysis, we tune the algorithms and optimize the code to substantially reduce the synchronization time to 0.2 seconds and the processing time of one OFDM block to 1.7 seconds on a DSP processor at 225 MHz. This experimentation provides guidelines on our future work to reduce the per-block processing time to be less than the block duration of 0.23 seconds for real time operations. Underwater acoustic communication http://dl.acm.org/citation.cfm?id=1287831
C. V. Lopes and P. M. Aguiar, ―Acoustic modems for ubiquitous computing,‖ IEEE Pervasive Computing, vol. 2, no. 3, pp. 62–71, 2003. Considers how sound offers features not available with other short-range, low bandwidth communication technologies, such as radio and infrared, enabling communication among small computing devices and humans in a ubiquitous computing environment. Different types of transmission technologies are evaluated: Amplitude Shift Keying, Frequency Shift Keying, Frequency Hopping and other modulation schemes http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1228528
R. Nandakumar, K. K. Chintalapudi, V. Padmanabhan, and R. Venkatesan, ―Dhwani: Secure peer-to-peer acoustic NFC,‖ in Proc. ACM SIGCOMM 2013 Conference, New York, USA: ACM, Aug 2013, pp. 63–74. Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer manner without incurring complex network configuration overheads. However, adoption of NFC-enabled applications has been stymied by the low levels of penetration of NFC hardware. In this paper, we address the challenge of enabling NFC-like capability on the existing base of mobile phones. To this end, we develop Dhwani, a novel, acoustics-based NFC system that uses the microphone and speakers on mobile phones, thus eliminating the need for any specialized NFC hardware. A key feature of Dhwani is the JamSecure technique, which uses self-jamming coupled with self-interference cancellation at the receiver, to provide an information-theoretically secure communication channel between the devices. Our current implementation of Dhwani achieves data rates of up to 2.4 Kbps, which is sufficient for most existing NFC applications. Acoustic NFC, audible (at 6kHz), They enable acoustic peer-to-peer near-field-communication (up to 15-20 cm), where eavesdropping by third parties is prevented by the means of active signal jamming. http://dl.acm.org/citation.cfm?id=2486037
Ortega, A. A., Bettachini, V. A., Fierens, P. I., & Alvarez-Hamelin, J. I. (2014). Encrypted CDMA Audio Network. Journal of Information Security, 2014. We present a secure LAN using sound as the physical layer for low speed applications. In particular, we show a real implementation of a point-to-point or point-to-multipoint secure acoustic network, having a short range, consuming a negligible amount of power, and requiring no specific hardware on mobile clients. The present acoustic network provides VPN-like private channels to multiple users sharing the same medium. It is based on Time-hopping CDMA, and makes use of an encrypted Bloom filter. An asymmetrical error-correction is used to supply data integrity, even in the presence of strong interference. Simulations and real experiments show its feasibility. We also provide some theoretical analysis on the principle of operation. Secure Acoustic Communication Network. They use the hearable range (10-16kHz) http://file.scirp.org/Html/1-7800207_47297.htm