Skip to main content
Article
Audio-based Security Techniques for Secure Device-to-Device (D2D) Communications
IEEE Network
  • Daijang Chen, Network and Data Security Key Laboratory, University of Electronic Science and Technology of China, Chengdu, 611731, China, & Peng Cheng Laboratory, Shenzhen, 518055, China
  • Ning Zhang, Department of ECE, University of Windsor, ON, N9B 3P4, Canada
  • Huici Wu, Beijing University of Posts and Telecommunications (BUPT), Beijing 100876, China
  • Kuan Zhang, Department of ECE, University of NebraskaLincoln, Omaha, NE 68182, USA
  • Rongxing Lu, School of Computer Science, University of New Brunswick, NB, E3B 5A3, Canada
  • Mohsen Guizani, Mohamed bin Zayed University of Artificial Intelligence
Document Type
Article
Abstract

In this article, we investigate audio-based security techniques to secure Device-to-Device (D2D) communications. First, the key distribution techniques for secure D2D communication are discussed, which generate the key by using the estimated response of the audio channels between two legitimate devices. Then, keyless D2D secure communication over audio channels is studied by using self-jamming and self-interference cancellation techniques. Furthermore, a novel audio-based secure transmission scheme is proposed by leveraging secure polar code and self-jamming techniques to achieve high efficiency and high level of security. Finally, open research issues of audio-based security are discussed to enhance security of D2D communications. IEEE

DOI
10.1109/MNET.005.2100336
Publication Date
7-25-2022
Keywords
  • Acoustics,
  • Device-to-device communication,
  • Interference cancellation,
  • Jamming,
  • Microphones,
  • Receivers,
  • Security,
  • Transmissions
Comments

IR Deposit conditions:

OA version (pathway a) Accepted version

No embargo

When accepted for publication, set statement to accompany deposit (see policy)

Must link to publisher version with DOI

Publisher copyright and source must be acknowledged

Citation Information
D. Chen, N. Zhang, H. Wu, K. Zhang, R. Lu and M. Guizani, "Audio-based Security Techniques for Secure Device-to-Device (D2D) Communications," in IEEE Network, doi: 10.1109/MNET.005.2100336.