1 Dhwani : Peer–Peer Secure Acoustic NFC Rajalakshmi Nandakumar Krishna Chintalapudi Venkata Padmanabhan Ramarathnam Venkatesan Microsoft Research India.

Slides:



Advertisements
Similar presentations
IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Advertisements

Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Multiple Access Techniques for wireless communication
Analogue to Digital Conversion (PCM and DM)
Chapter-3-1CS331- Fakhry Khellah Term 081 Chapter 3 Data and Signals.
ECE 4321: Computer Networks Chapter 3 Data Transmission.
Chapter 5 Analog Transmission
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
Wireless Networks and Spread Spectrum Technologies.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Digital Data Transmission ECE 457 Spring Information Representation Communication systems convert information into a form suitable for transmission.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Three Police Technology Wireless Communications.
1 EQ2430 Project Course in Signal Processing and Digital Communications - Spring 2011 On phase noise and it effect in OFDM communication system School.
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
William Stallings Data and Computer Communications 7th Edition
#7 1 Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science University of Kansas 2335 Irving Hill Dr. Lawrence,
Spread Spectrum Steganography
3.1 Chapter 3 Data and Signals Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Wireless communication channel
Introduction to Wireless Communication. History of wireless communication Guglielmo Marconi invented the wireless telegraph in 1896 Communication by encoding.
ESTeem Training Class Radio Technology Overview. Radio Basics Terminology – Familiarization with radio expressions Basic Components – Transmitter – Receiver.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Software Defined Radio Brad Freyberg, JunYong Lee, SungHo Yoon, Uttara Kumar, Tingting Zou Project Description System Design The goal of our project is.
King Saud University College of Applied studies and Community Service 1301CT By: Nour Alhariqi 1nalhareqi st semester
1 Summary of SDR Analog radio systems are being replaced by digital radio systems for various radio applications. SDR technology aims to take advantage.
Digital to analogue conversion. 1 DIGITAL-TO-ANALOG CONVERSION Digital-to-analog conversion is the process of changing one of the characteristics (A,
Data Transmission The basics of media, signals, bits, carries, and modems (Part II)
Radio Communication SL – Option F.1. Radio communication includes any form of communication that uses radio (EM) waves to transfer information –TV, mobile.
ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING(OFDM)
Technician License Course Chapter 5 Operating Station Equipment Lesson Plan Module 11: Transmitters, Receivers and Transceivers.
Physical Layer (2). Goal Physical layer design goal: send out bits as fast as possible with acceptable low error ratio Goal of this lecture – Review some.
Full-duplex Backscatter for
Wireless Communications
Wireless Communication Technologies 1 Outline Introduction OFDM Basics Performance sensitivity for imperfect circuit Timing and.
EELE 5490, Fall, 2009 Wireless Communications Ali S. Afana Department of Electrical Engineering Class 5 Dec. 4 th, 2009.
6/8/2006UWSN Reading Group1 Tutorial on Underwater Acoustic Communications Speaker: Baosheng Li Advisor: Shengli Zhou June 8, 2006 Presentation is based.
Modulation-Why? 1. Low frequency signal has less energy, which means it can travel less distance. 2. Practibility of antenna.
The Physical Layer Lowest layer in Network Hierarchy. Physical transmission of data. –Various flavors Copper wire, fiber optic, etc... –Physical limits.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Signals and Emissions 1 G8 - SIGNALS AND EMISSIONS [2 exam questions - 2 groups] G8A - Carriers and modulation: AM; FM; single and double sideband; modulation.
CHAPTER4: CONTINUOUS-WAVE (CW) MODULATION First semester King Saud University College of Applied studies and Community Service 1301CT.
1 Chapter 7. Spread Spectrum Wen-Shyang Hwang KUAS EE.
Communications Systems. 1Analogue modulation: time domain (waveforms), frequency domain (spectra), amplitude modulation (am), frequency modulation (fm),
Physical Layer PART II. Position of the physical layer.
Mobile Computing and Wireless Networking Lec 02
OFDM Based WLAN System Song Ziqi Zhang Zhuo.
CS434/534: Mobile Computing and Wireless Networks Y. Richard Yang 08/30/2012.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 9 Spread Spectrum.
1 Orthogonal Frequency- Division Multiplexing (OFDM) Used in DSL, WLAN, DAB, WIMAX, 4G.
1 st semester 1436/  When a signal is transmitted over a communication channel, it is subjected to different types of impairments because of imperfect.
FMT Modulation for Wireless Communication
1 Spread Spectrum Technology. 2 What is Spread Spectrum(SS) Spread Spectrum (SS) technology was first introduced by military as a way of sending secure.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Ripple I and II: Communicating through Physical Vibrations Reading Group Presentation by Swadhin Pradhan 03/23/2016 Roy et. al., UIUC, NSDI 2015 and NSDI.
TUNALIData Communication1 Spread Spectrum Chapter 9.
 Abbreviation of fourth generation wireless technology  It will provide a comprehensive IP solution where voice, data and multimedia can be given to.
DATA AND COMPUTER COMMUNICATIONS Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Introduction to OFDM and Cyclic prefix
Computer Networks Chapter 5 – Analog Transmission.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Shadowing.
Dr. Yeffry Handoko Putra, M.T
Wireless LANs Wireless proliferating rapidly.
Dhwani : Peer–Peer Secure Acoustic NFC
Introduction to electronic communication systems
Overview Communication is the transfer of information from one place to another. This should be done - as efficiently as possible - with as much fidelity/reliability.
Field Measurements of 2x2 MIMO Communications
Acoustic Eavesdropping through Wireless Vibrometry
Presentation transcript:

1 Dhwani : Peer–Peer Secure Acoustic NFC Rajalakshmi Nandakumar Krishna Chintalapudi Venkata Padmanabhan Ramarathnam Venkatesan Microsoft Research India

2 Near Field Communication (NFC) Communication between physically proximate devices. Key Advantage: No network configuration effort. Association by proximity: devices are connected to each other by virtue of proximity Used in contactless payments, short data transfer, ticketing, healthcare etc.

3 Low levels of penetration of NFC hardware today –Works on the principle of magnetic induction-special hardware –12% in U.S., as of 2012 –penetration is expected to be under 50% globally by 2017 NFC standard does not define security at the physical layer –Assumes security is inherent due to low range –Snooping NFC transactions has been demonstrated (NISK 2009) NFC - Limitations Can we enable secure NFC-like communication in today’s devices ?

4 Yes. We can ! Dhwani - acoustic NFC system Uses phone’s speaker and microphone. Software only – can be a downloadable app. Currently supports upto 2.4 Kbps data rate over 1 KHz bandwidth. JamSecure – secure communication Information-theoretic approach to security. Security at physical layer by jamming and self-interference cancellation at the receiver.

5 Today’s Talk Dhwani : Acoustic NFC system Challenges in acoustic communication Dhwani – system design JamSecure : Secure NFC technique JamSecure - Idea Scope and Limitations Dhwani : Performance Performance of JamSecure and communication system.

6 Acoustic Communication Modulation Speaker mic Message Decode Acoustic Communication Modulation Message Decode RF Communication Sender antenna Receiver antenna

7 Acoustic Communication - Challenges Speaker microphone Acoustic Communication Acoustic Channel RF Communication Sender antenna RF channel Receiver antenna 1) Speaker-mic frequency selectivity 1) Antenna frequency response is flat 2) Echo (in ms) 2) Multipath (in µs) 3) Channel not defined – ambient noise interference 3) Channel is defined – interference is limited

8 Challenge 1 : Frequency selectivity Imperfect electromechanical conversion Frequency response is not uniform Significant degradation above 12 KHz – significant data loss in that band

9 5ms long sine wave was transmitted and received by a nearby device. Challenge 2 : Ringing and rise time Received signal Time (ms) 15 ms ringing time Causes ISI 2 ms rise time

10 Challenge 3 : Ambient noise Frequency spectrum of Ambient noise Ambient noise measured in various locations Significant till 6KHz in noisy malls Can cause interference

11 Dhwani – Design Software designed Acoustic OFDM radio Ideal for frequency selective channels Carrier-less design 128 sub-carriers each 171 Hz width Operating Bandwidth : 1 KHz (6-7 KHz) Band pass filter at the receiver No interference from ambient noise (< 6KHz) Better frequency response 4 ms cyclic prefix. Handles ISI caused by ringing of devices and multipath 8 PSK in each sub-carrier gives 2.4 Kbps data rate

Dhwani - Design Software defined acoustic OFDM radio –Ideal for frequency selective channels {challenge 1} Carrier-less design 128 sub-carriers each 171Hz operating bandwidth 1 KHz (6-7KHz) high pass filter at the receiver {challenge 3} 4ms cyclic prefix {challenge 2} 8 PSK in each subcarrier gives 2.4 Kbps data rate. Frequency (KHz) 0176 …. 22 Frequency (KHz)

13 Today’s Talk Dhwani : Acoustic NFC system Challenges in acoustic communication Dhwani – system design JamSecure : Secure NFC technique JamSecure - Idea Scope and Limitations Dhwani : Performance Performance of JamSecure and communication system.

14 JamSecure - Idea Transmitter Receiver Eavesdropper SNR E = P AE – P BE db SIC gain = IC db PAPA PBPB SNR at the eavesdropper is to the left of the curve and SNR at the receiver is to the right of the curve. 5dB cancellation no cancellation How much jamming is needed? A B B E SNR E ~= P A – P B db SNR B = P A -P B +IC db

15 Key Challenge – Self Interference cancellation s(t) r(t) s(t) != r(t) Channel estimation based SIC Estimate the frequency dependant channel gain by sending a known sequence The frequency resolution depends on the reverberation in the channel Since reverberation is high (>15ms), these techniques does not give high SIC Hence estimate the received signal r(t)

16 Key Observation Frequency response mostly remains constant received signal r(t) ~= signal sent s(t) Speaker Microphone characteristics (static) Synchronization error (dynamic) Multipath (dynamic) Frequency selectivity is mostly due to static speaker – microphone characteristics It can be pre-computed and saved

17 JamSecure Training Phase: generates a library of n PN sequences PN i xmit I = 1..N Transmits each of PN sequence and records the received signal. PN i recv I = 1..N PN xmit PN recv PN i xmit PN i recv

JamSecure Actual Jamming: If one jamming sequence is chosen randomly, eavesdropper can learn the library over time. PN xmit 1 2 k... JamPN j xmit PN recv 1 2 k... JamPN j recv K – Mixing factor r(t) SIC Key Advantage: Eliminates effects due to speaker – mic. Computationally intractable to learn PN sequences for eavesdropper. Due to linearity

19 Compensating for dynamic errors Synchronization errors: –Receiver maintains time-shifted versions of all signals. –compares the received PN signal with all the time shifted versions at different sample offsets –Identifies the preamble start and sampling offset Multipath errors: –Estimates the channel using first few samples by fourier transform. –Applies the corrections for each frequency component.

20 Limitations of JamSecure The transmitter and the intended receiver are trusted devices. DoS attacks: Happens when the eavesdropper also starts jamming. But does not leak the private data. Directional antenna attacks: Eavesdropper focuses only on the transmitter Hard in practice as it has to focus into < 10cm. Transmitter Receiver Transmission Jamming Eavesdropper 10cm

21 Today’s Talk Dhwani : Acoustic NFC system Challenges in acoustic communication Dhwani – system design JamSecure : Secure NFC technique JamSecure - Idea Scope and Limitations Dhwani : Performance Performance of JamSecure and communication system.

22 Dhwani – Communication range Packet success rates at different transmission ranges Dhwani enables NFC like communication with range < 10cm PSR is 100% for BPSK and 90% for QPSK

23 Performance of SIC Self interference cancellation For training and testing at same location (L1-L1), SIC > 10db when k = 5 For training and testing at different locations, SIC > 6db Locations: L1 : small conference room L2 : large conference room L3 : open pantry Li-Lj : training at Li and testing at Lj

24 Related Work Acoustic communication “Audio Networking – The forgotten wireless technology” (IEEE pervasive computing 2005) –Provides extensive review of short and long distance acoustic communication –Uses on-off keying –270 bps data rate JamSecure IMDShield – “They can hear your heartbeats : Non-invasive security for implanted medical devices” (Sigcomm 2011) –Security for IMD without modifying them. –base station that continuously listens to IMD transmissions and transmits a jamming signal to secure it from eavesdroppers. –channel estimation based SIC –Dhwani a) software only b) pre-computed library based SIC

25 Questions Dhwani Enables NFC in today’s devices Software only solution Provides security at physical layer