Audio-Based Security Techniques for Secure Device-to-Device Communications

被引:6
|
作者
Chen, Dajiang [1 ]
Zhang, Ning [2 ]
Wu, Huici [3 ]
Zhang, Kuan [4 ]
Lu, Rongxing [5 ]
Guizani, Mohsen [6 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Univ Windsor, Windsor, ON, Canada
[3] Beijing Univ Posts & Telecommun BUPT, Beijing, Peoples R China
[4] Univ Nebraska Lincoln, Lincoln, NE USA
[5] Univ New Brunswick, Fredericton, NB, Canada
[6] Mohamed Bin Zayed Univ Artificial Intelligence MBZ, Abu Dhabi, U Arab Emirates
来源
IEEE NETWORK | 2022年 / 36卷 / 06期
关键词
Jamming; Device-to-device communication; Acoustics; Security; Receivers; Microphones; Interference cancellation; MESSAGE AUTHENTICATION;
D O I
10.1109/MNET.005.2100336
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we investigate audio-based security techniques to secure Device-to-Device (D2D) communications. First, the key distribution techniques for secure D2D communication are discussed, which generate the key by using the estimated response of the audio channels between two legitimate devices. Then, keyless D2D secure communication over audio channels is studied by using self-jamming and self-interference cancellation techniques. Furthermore, a novel audio-based secure transmission scheme is proposed by leveraging secure polar code and self-jamming techniques to achieve high efficiency and high level of security. Finally, open research issues of audio-based security are discussed to enhance security of D2D communications.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 50 条
  • [1] Security in device-to-device communications: a survey
    Hamoud, Othmane Nait
    Kenaza, Tayeb
    Challal, Yacine
    [J]. IET NETWORKS, 2018, 7 (01) : 14 - 22
  • [2] Secure Key Establishment for Device-to-Device Communications
    Shen, Wenlong
    Hong, Weisheng
    Cao, Xianghui
    Yin, Bo
    Shila, Devu Manikantan
    Cheng, Yu
    [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 336 - 340
  • [3] Secure Message Delivery Games for Device-to-Device Communications
    Panaousis, Emmanouil
    Alpcan, Tansu
    Fereidooni, Hossein
    Conti, Mauro
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 195 - 215
  • [4] Secure Device-to-Device Communications over WiFi Direct
    Shen, Wenlong
    Yin, Bo
    Cao, Xianghui
    Cai, Lin X.
    Cheng, Yu
    [J]. IEEE NETWORK, 2016, 30 (05): : 4 - 9
  • [5] DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE
    Zhu, Daohua
    Swindlehurst, A. Lee
    Fakoorian, S. Ali A.
    Xu, Wei
    Zhao, Chunming
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [6] Device-to-Device Communications for National Security and Public Safety
    Fodor, Gabor
    Parkvall, Stefan
    Sorrentino, Stefano
    Wallentin, Pontus
    Lu, Qianxi
    Brahmi, Nadia
    [J]. IEEE ACCESS, 2014, 2 : 1510 - 1520
  • [7] A Secure Device Management Scheme with Audio-Based Location Distinction in IoT
    Lin, Haifeng
    Liu, Xiangfeng
    Chen, Chen
    Liu, Zhibo
    Zhao, Dexin
    Zhang, Yiwen
    Li, Weizhuang
    Cao, Mingsheng
    [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 138 (01): : 939 - 956
  • [8] Anonymous Communications for Secure Device-to-Device Aided Fog Computing
    Gope, Prosanta
    Lee, Jemin
    Hsu, Ruei-Hau
    Quek, Tony Q. S.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (03) : 10 - 16
  • [9] Secure Resource Allocation in Device-to-Device Communications Underlaying Cellular Networks
    Hossein Ghavami
    Bahareh Akhbari
    [J]. China Communications, 2022, (08) : 149 - 167
  • [10] Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
    Sun, Jingchao
    Zhang, Rui
    Zhang, Yanchao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 1048 - 1060