ABSTRACT
Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer manner without incurring complex network configuration overheads. However, adoption of NFC-enabled applications has been stymied by the low levels of penetration of NFC hardware. In this paper, we address the challenge of enabling NFC-like capability on the existing base of mobile phones. To this end, we develop Dhwani, a novel, acoustics-based NFC system that uses the microphone and speakers on mobile phones, thus eliminating the need for any specialized NFC hardware. A key feature of Dhwani is the JamSecure technique, which uses self-jamming coupled with self-interference cancellation at the receiver, to provide an information-theoretically secure communication channel between the devices. Our current implementation of Dhwani achieves data rates of up to 2.4 Kbps, which is sufficient for most existing NFC applications.
- Wimbeep. https://sites.google.com/site/wimbeep/.Google Scholar
- Zoosh. http://www.naratte.com/.Google Scholar
- Advanced Encryption Standard (AES), Nov 2001. U.S. Federal Information Processing Standard Publication 197, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.Google Scholar
- Near Field Communication Interface and Protocol (NFCIP-1), Dec 2004. ECMA-340 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-340.htm.Google Scholar
- NFC-SEC Whitepaper, Dec 2008. http://www.ecma-international.org/activities/Communications/tc47--2008-089.pdf.Google Scholar
- NFC-SEC-01: NFC-SEC Cryptography Standard using ECDH and AES, Jun 2010. ECMA-386 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-386.htm.Google Scholar
- NFC-SEC: NFCIP-1 Security Services and Protocol, Jun 2010. ECMA-385 Standard (2nd Edition), http://www.ecma-international.org/publications/standards/Ecma-385.htm.Google Scholar
- Start-Up Naratte Launches Novel Ultrasonic Near-Field Communications Solution, Jul 2011. http://www.bdti.com/InsideDSP/2011/07/28/Naratte.Google Scholar
- 86% of POS terminals in North America will accept NFC payments by 2017, Jun 2012. http://www.nfcworld.com/2012/06/07/316112/berg-86-percent-of-pos-terminals-in-north-america-will-accept-nfc-payments-by-2017/.Google Scholar
- At Villanova University, NFC Technology Being Tested, Mar 2012. http://www.todaysfacilitymanager.com/2012/03/at-villanova-university-nfc-technology-being-tested.Google Scholar
- NFC specialist Tapit to raise US\$8m for international expansion, Jul 2012. http://www.nfcworld.com/2012/07/26/317057/nfc-specialist-tapit-to-raise-us8m-for-international-expansion/.Google Scholar
- S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices. In SIGCOMM, 2011. Google ScholarDigital Library
- E. Haselsteiner and K. Breitfuss. Security in Near Field Communication (NFC). In Workshop on RFID Security, Jul 2006.Google Scholar
- M. Jain, J. I. Choi, T. Kim, D. Bharadia, K. Srinivasan, S. Seth, P. Levis, S. Katti, and P. Sinha. Practical, Real-time, Full Duplex Wireless. In Mobicom, 2011. Google ScholarDigital Library
- S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. In Mobicom, 2009. Google ScholarDigital Library
- H. Kortvedt and S. Mjolsnes. Eavesdropping Near Field Communication. In The Norwegian Information Security Conference (NISK), Nov 2009.Google Scholar
- A. Madhavapeddy, D. Scott, A. Tse, and R. Sharp. Audio Networking: The Forgotten Wireless Technology. IEEE Pervasive Computing, 2005. Google ScholarDigital Library
- I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. In WiSec, 2009. Google ScholarDigital Library
- S. Mathur, N. M, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Mobicom, 2008. Google ScholarDigital Library
- C. E. Shannon. Communication Theory of Secrecy Systems. Bell Systems Technical Journal, 28, Oct 1949.Google Scholar
- A. Wyner. The Wire-Tap Channel. Bell Systems Technical Journal, 54, 1974.Google Scholar
Index Terms
- Dhwani: secure peer-to-peer acoustic NFC
Recommendations
Dhwani: secure peer-to-peer acoustic NFC
Near Field Communication (NFC) enables physically proximate devices to communicate over very short ranges in a peer-to-peer manner without incurring complex network configuration overheads. However, adoption of NFC-enabled applications has been stymied ...
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10: Proceedings of the 6th international conference on Radio frequency identification: security and privacy issuesNFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest and in some cases these services are relying on NFC communication. It ...
Offline NFC payments with electronic vouchers
MobiHeld '09: Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handheldsIn this paper a practical offline payment system based on digital vouchers using Near Field Communication (NFC) in mobile phones is presented. This work was performed within the scope of the IBBT NFC-Voucher project. The goal of the project is to assess ...
Comments