Encrypted CDMA Audio Network


We present a secure LAN using sound as the physical layer for low speed applications. In particular, we show a real implementation of a point-to-point or point-to-multipoint secure acoustic network, having a short range, consuming a negligible amount of power, and requiring no specific hardware on mobile clients. The present acoustic network provides VPN-like private channels to multiple users sharing the same medium. It is based on Time-hopping CDMA, and makes use of an encrypted Bloom filter. An asymmetrical error-correction is used to supply data integrity, even in the presence of strong interference. Simulations and real experiments show its feasibility. We also provide some theoretical analysis on the principle of operation.

Share and Cite:

Ortega, A. , Bettachini, V. , Fierens, P. and Alvarez-Hamelin, J. (2014) Encrypted CDMA Audio Network. Journal of Information Security, 5, 73-82. doi: 10.4236/jis.2014.53008.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Zhang, F., He, W., Liu, X. and Bridges, P.G. (2011) Inferring Users’ Online Activities through Traffic Analysis. WiSec’11—Proceedings of the 4th ACM Conference on Wireless Network Security, Hamburg, 15-17 June 2011, 59-69. http://dx.doi.org/10.1145/1998412.1998425
[2] Mathur, S., Trappe, W., Mandayam, N., Ye, C. and Reznik, A. (2008) Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. MobiCom 2008—Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, 14-19 September 2008, 128-139. http://dx.doi.org/10.1145/1409944.1409960
[3] Jakobsson, M. and Wetzel, S. (2001) Security Weaknesses in Bluetooth. In: Naccache, D., Ed., Topis in Cryptology— CT-RSA 2001, Springer, Berlin Heidelberg, 176-191. http://dx.doi.org/10.1007/3-540-45353-9_14
[4] Radosavac, S., Cárdenas, A.A., Baras, J.S. and Moustakides, G.V. (2007) Detecting IEEE 802.11 MAC Layer Misbehavior in Ad Hoc Networks: Robust Strategies against Individual and Colluding Attackers. Journal of Computer Security, 15, 103-128.
[5] Kumar, A., Saxena, N., Tsudik, G. and Uzun, E. (2009) A Comparative Study of Secure Device Pairing Methods. Pervasive and Mobile Computing, 5, 734-749.
[6] Hanspach, M. and Goetz, M. (2013) On Covert Acoustical Mesh Networks in Air. Journal of Communications, 8, 758-767. http://dx.doi.org/10.12720/jcm.8.11.758-767
[7] ECMA International (2005) Near Field Communication—White Paper.
[8] August, K.G., Sizer II, T. and Wright, G.A. (2000) Apparatus and Method for Initiating a Transaction Having Acoustic Data Receiver That Filters Human Voice. US Patent No. 6125172.
[9] Nandakumar, R., Chintalapudi, K.K., Padmanabhan, V. and Venkatesan, R. (2013) Dhwani: Secure Peer-to-Peer Acoustic NFC. ACM SIGCOMM 2013—Proceedings of the Conference of the ACM Special Interest Group on Data Communication, Hong Kong, 12-16 August 2013, 63-74.
[10] Leus, G., Van Walree, P., Boschma, J., Fanciullacci, C., Gerritsen, H. and Tusoni, P. (2008) Covert Underwater Communications with Multiband OFDM. OCEANS 2008, Oceans, Poles and Climate: Technological Challenges, Quebec, 15-18 September 2008, 1-8.
[11] Ortega, A.A., Bettachini, V.A., Grosz, D.F. and Alvarez-Hamelin, J.I. (2011) Point-to-Point and Point-to-Multipoint CDMA Access Network with Enhanced Security. Advanced Photonics, OSA Technical Digest (CD), Toronto, 12-14 June 2011, Paper ATuB6. http://dx.doi.org:10.1364/ANIC.2011.ATuB6
[12] Ortega, A.A., Bettachini, V.A., Grosz, D.F. and Alvarez-Hamelin, J.I. (2012) Hamming-Weight Minimisation Coding for CDMA Optical Access Networks with Enhanced Security. International Conference on Future Generation Communication Technology (FGCT), London, 12-14 December 2012, 185-189.
[13] Menezes, A.J., van Oorschot, P.C. and Vanstone, S.A. (1996) Handbook of Applied Cryptography. CRC Press, Boca Raton. http://dx.doi.org/10.1201/9781439821916
[14] Harris, B. (2006) Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol. http://www.rfc-base.org/rfc-4345.html
[15] Moon, T.K. (2005) Error Correction Coding: Mathematical Methods and Algorithms. John Wiley & Sons, New York. http://dx.doi.org/10.1002/0471739219
[16] Roberts, L.G. (1975) ALOHA Packet System with and without Slots and Capture. Computer Communication Review, 5, 28-42. http://dx.doi.org/10.1145/1024916.1024920
[17] Tallini, L.G., Al-Bassam, S. and Bose, B. (2002) On the Capacity and Codes for the z-Channel. Proceedings of the IEEE International Symposium on Information Theory (ISIT’02), Lausanne, 30 June-5 July 2002, 422. http://dx.doi.org/10.1109/ISIT.2002.1023694
[18] Bloom, B.H. (1970) Space/Time Trade-Offs in Hash Coding with Allowable Errors. Communications of the ACM, 13, 422-426. http://dx.doi.org/10.1145/362686.362692

Copyright © 2022 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.