[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3472749.3477980acmconferencesArticle/Chapter ViewAbstractPublication PagesuistConference Proceedingsconference-collections
research-article
Public Access

Bit Whisperer: Enabling Ad-hoc, Short-range, Walk-Up-and-Share Data Transmissions via Surface-restricted Acoustics

Published: 12 October 2021 Publication History

Abstract

Bluetooth requires device pairing to ensure security in data transmission, encumbering a number of ad-hoc, transactional interactions that require both ease-of-use and “good enough” security: e.g., sharing contact information or secure links to people nearby. We introduce Bit Whisperer, an ad-hoc short-range wireless communication system that enables “walk up and share” data transmissions with “good enough” security. Bit Whisperer transmits data to proximate devices co-located on a solid surface through high frequency, inaudible acoustic signals. The physical surface has two benefits: it enhances acoustic signal transmission by reflecting sound waves as they propagate; and, it makes the domain of communication visible, helping users identify exactly with whom they are sharing data without prior pairing. Through a series of technical evaluations, we demonstrate that Bit Whisperer is robust for common use-cases and secure against likely threats. We also implement three example applications to demonstrate the utility of Whisperer: 1-to-1 local contact sharing, 1-to-N private link sharing to open a secure group chat, and 1-to-N local device authentication.

References

[1]
Pavel ANDREEV, Bohos Aprahamian, and Marin Marinov. 2019. QR code’s maximum scanning distance investigation. In 2019 16th Conference on Electrical Machines, Drives and Power Systems (ELMA). IEEE, 1–4.
[2]
Richard E. Berg. 2019. Sound absorption. https://www.britannica.com/science/sound-physics/Sound-absorption
[3]
Ming Ki Chong and Hans Gellersen. 2012. Usability Classification for Spontaneous Device Association. Personal Ubiquitous Comput. 16, 1 (Jan. 2012), 77–89. https://doi.org/10.1007/s00779-011-0421-1
[4]
Sauvik Das, Gierad Laput, Chris Harrison, and Jason I Hong. 2017. Thumprint: Socially-inclusive local group authentication through shared secret knocks. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 3764–3774.
[5]
Dianqi Han, Yimin Chen, Tao Li, Rui Zhang, Yaochao Zhang, and Terri Hedgpeth. 2018. Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 401–415.
[6]
Ben Hutchins, Anudeep Reddy, Wenqiang Jin, Michael Zhou, Ming Li, and Lei Yang. 2018. Beat-PIN: A User Authentication Mechanism for Wearable Devices Through Secret Beats. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Incheon, Republic of Korea) (ASIACCS ’18). ACM, New York, NY, USA, 101–115. https://doi.org/10.1145/3196494.3196543
[7]
Inhwan Hwang, Jungchan Cho, and Songhwai Oh. 2012. Privacy-aware communication for smartphones using vibration. In 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 447–452.
[8]
COMSOL Inc.2019. COMSOL Multiphysics 5.4. https://www.comsol.com/
[9]
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, and Srdjan Capkun. 2015. Sound-proof: usable two-factor authentication based on ambient sound. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 483–498.
[10]
Younghyun Kim, Woo Suk Lee, Vijay Raghunathan, Niraj K Jha, and Anand Raghunathan. 2015. Vibration-based secure side channel for medical devices. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC). IEEE, 1–6.
[11]
Marc Langheinrich. 2001. Privacy by design—principles of privacy-aware ubiquitous systems. In International conference on Ubiquitous Computing. Springer, 273–291.
[12]
Gierad Laput, Robert Xiao, and Chris Harrison. 2016. Viband: High-fidelity bio-acoustic sensing using commodity smartwatch accelerometers. In Proceedings of the 29th Annual Symposium on User Interface Software and Technology. ACM, 321–333.
[13]
Dingzeyu Li, David IW Levin, Wojciech Matusik, and Changxi Zheng. 2016. Acoustic voxels: Computational optimization of modular acoustic filters. ACM Transactions on Graphics (TOG) 35, 4 (2016), 1–12.
[14]
Angela M Lonzetta, Peter Cope, Joseph Campbell, Bassam J Mohd, and Thaier Hayajneh. 2018. Security vulnerabilities in Bluetooth technology as used in IoT. Journal of Sensor and Actuator Networks 7, 3 (2018), 28.
[15]
Rajalakshmi Nandakumar, Krishna Kant Chintalapudi, Venkat Padmanabhan, and Ramarathnam Venkatesan. 2013. Dhwani: secure peer-to-peer acoustic NFC. ACM SIGCOMM Computer Communication Review 43, 4 (2013), 63–74.
[16]
Project Nayuki. [n.d.]. Reed-Solomon error-correcting code decoder. https://www.nayuki.io/page/reed-solomon-error-correcting-code-decoder
[17]
S. Pallavi and V. A. Narayanan. 2019. An Overview of Practical Attacks on BLE Based IOT Devices and Their Security. In 2019 5th International Conference on Advanced Computing Communication Systems (ICACCS). 694–698. https://doi.org/10.1109/ICACCS.2019.8728448
[18]
J. Potts and S. Sukittanon. 2012. Exploiting Bluetooth on Android mobile devices for home security application. In 2012 Proceedings of IEEE Southeastcon. 1–4. https://doi.org/10.1109/SECon.2012.6197001
[19]
Irving S Reed and Gustave Solomon. 1960. Polynomial codes over certain finite fields. Journal of the society for industrial and applied mathematics 8, 2(1960), 300–304.
[20]
Nirupam Roy and Romit Roy Choudhury. 2016. Ripple {II}: Faster Communication through Physical Vibration. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). 671–684.
[21]
Nirupam Roy, Mahanth Gowda, and Romit Roy Choudhury. 2015. Ripple: Communicating through physical vibration. In 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15). 265–278.
[22]
Ravi Sandhu. 2003. Good-enough security. IEEE Internet Computing 7, 1 (2003), 66–68.
[23]
Karen Scarfone and John Padgette. 2008. Guide to bluetooth security. NIST Special Publication 800, 2008 (2008), 121.
[24]
Dominik Schürmann and Stephan Sigg. 2011. Secure communication based on ambient audio. IEEE Transactions on mobile computing 12, 2 (2011), 358–370.
[25]
Jiayao Tan, Xiaoliang Wang, Cam-Tu Nguyen, and Yu Shi. 2018. SilentKey: A New Authentication Framework Through Ultrasonic-based Lip Reading. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 1, Article 36 (March 2018), 18 pages. https://doi.org/10.1145/3191768
[26]
Wikipedia. 2019. Audio frequency — Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=Audio%20frequency&oldid=923460999. [Online; accessed 15-November-2019].
[27]
Wikipedia. 2019. Speed of sound — Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=Speed%20of%20sound&oldid=924904463. [Online; accessed 12-November-2019].
[28]
Wikipedia. 2021. Advanced Encryption Standard — Wikipedia, The Free Encyclopedia. http://en.wikipedia.org/w/index.php?title=Advanced%20Encryption%20Standard&oldid=1008726613. [Online; accessed 27-March-2021].
[29]
Zhenyu Wu, Ali Bilgin, and Michael W Marcellin. 2002. Unequal error protection for transmission of JPEG2000 codestreams over noisy channels. In Proceedings. International Conference on Image Processing, Vol. 1. IEEE, I–I.
[30]
Robert Xiao, Sven Mayer, and Chris Harrison. 2020. VibroComm: Using Commodity Gyroscopes for Vibroacoustic Data Reception. In 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services. 1–9.
[31]
Bingsheng Zhang, Qin Zhan, Si Chen, Muyuan Li, Kui Ren, Cong Wang, and Di Ma. 2014. PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. IEEE internet of things journal 1, 1 (2014), 33–45.
[32]
Cheng Zhang, Sinan Hersek, Yiming Pu, Danrui Sun, Qiuyue Xue, Thad E Starner, Gregory D Abowd, and Omer T Inan. 2017. Bioacoustics-based human-body-mediated communication. Computer 50, 2 (2017), 36–46.
[33]
Lin Zhong, Dania El-Daye, Brett Kaufman, Nick Tobaoda, Tamer Mohamed, and Michael Liebschner. 2007. OsteoConduct: Wireless body-area communication based on bone conduction. In Proceedings of the ICST 2nd international conference on Body area networks. 1–8.
[34]
Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. 2014. Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Scottsdale, Arizona, USA) (CCS ’14). ACM, New York, NY, USA, 429–440. https://doi.org/10.1145/2660267.2660300

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
UIST '21: The 34th Annual ACM Symposium on User Interface Software and Technology
October 2021
1357 pages
ISBN:9781450386357
DOI:10.1145/3472749
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. acoustic data transmission
  2. ad-hoc connections
  3. usable security and privacy

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

UIST '21

Acceptance Rates

Overall Acceptance Rate 561 of 2,567 submissions, 22%

Upcoming Conference

UIST '25
The 38th Annual ACM Symposium on User Interface Software and Technology
September 28 - October 1, 2025
Busan , Republic of Korea

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 502
    Total Downloads
  • Downloads (Last 12 months)113
  • Downloads (Last 6 weeks)17
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media