Audio-based Security Techniques for Secure Device-to-Device (D2D) Communications
In this article, we investigate audio-based security techniques to secure Device-to-Device (D2D) communications. First, the key distribution techniques for secure D2D communication are discussed, which generate the key by using the estimated response of the audio channels between two legitimate devices. Then, keyless D2D secure communication over audio channels is studied by using self-jamming and self-interference cancellation techniques. Furthermore, a novel audio-based secure transmission scheme is proposed by leveraging secure polar code and self-jamming techniques to achieve high efficiency and high level of security. Finally, open research issues of audio-based security are discussed to enhance security of D2D communications. IEEE
Acoustics, Device-to-device communication, Interference cancellation, Jamming, Microphones, Receivers, Security, Transmissions
D. Chen, N. Zhang, H. Wu, K. Zhang, R. Lu and M. Guizani, "Audio-based Security Techniques for Secure Device-to-Device (D2D) Communications," in IEEE Network, doi: 10.1109/MNET.005.2100336.