Approaches for Inaudible Acoustic Communication
|Zhang, B., Zhan, Q., Chen, S., Li, M., Ren, K., Wang, C., & Ma, D. (2014). PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IEEE Internet of Things Journal, 1(1), 33-45.||Short-range wireless communication technologies have been used in many security-sensitive smartphone applications and services such as contactless micro payment and device pairing. Typically, the data confidentiality of the existing short-range communication systems relies on so-called “key-exchange then encryption” mechanism. Namely, both parties need to spend extra communication to establish a common key before transmitting their actual messages, which is inefficient, especially for short communication sessions. In this work, we present PriWhisper — a keyless secure acoustic short-range communication system for smartphones. It is designed to provide a purely software-based solution to secure smartphone short-range communication without the key agreement phase. PriWhisper adopts the emerging friendly jamming technique from radio communication for data confidentiality. The system prototype is implemented and eval-uated on several Android smartphone platforms for efficiency and usability. We theoretically and experimentally analyze the security of our proposed acoustic communication system against various passive and active adversaries. In particular, we also study the (in)separability of the data signal and jamming sig-nal against Blind Signal Segmentation (BSS) attacks such as Independent Component Analysis (ICA). The result shows that PriWhisper provides sufficient security guarantees for commercial smartphone applications and yet strong compatibilities with most legacy smartphone platforms||The Pre-Whisper project realizes novel NFC approaches for smartphones (among others with audio)||http://www.cse.msu.edu/~glxing/CSR-NFC.htm|
|Edwards, Alexander Orosz, "Ultrasonic Data Steganography" (2016). Honors College Capstones and Theses. 5. http://digitalcommons.kennesaw.edu/honors_etd/5|| What started off as a question on the possibly of data transmission via sound above the level of human hearing evolved into a project exploring the possibility of ultrasonic data infiltration and exfiltration in an information security context. It is well known that sound can be used to transmit data as this can be seen in many old technologies, most notably and simply DTMF tones for phone networks. But what if the sound used to transmit signals was in in the ultrasonic range? It would go generally unnoticed to anyone not looking for it with tools such as a spectrum analyzer. This could provide an unnoticed means of transmitting overhead data without the use of radio signals or physical connections, or, more clandestinely, a means to inject or retrieve data virtually undetect ed for espionage, control, or other malicious activity. As expected, there would obviously be issues with signal quality as the open air is heavy with environmental interference, but in specific cases as seen in the following research, a discrete sonic means of data transmission may not only be practical, but necessary for the task at hand.
This project is an exploration of the practicality of ultrasonic data transmission between computers. It will include research into the topic in general from scientific, technological, and security perspectives. There will be inclusions from other research projects as well as practical applications already in existence. Interestingly, there are already some suspected, but unconfirmed planned systems as well security incidents using this technology. Finally, a short seriesof semi-formal (in a scientific sense) experiments conducted to provide firsthand accounts and results of the ultrasonic data transmission concept
|A hands-on report on the development of an ultrasound communication approach. Related work is presented and problems of the technology are pointed out.||http://digitalcommons.kennesaw.edu/honors_etd/5/|