Data Over Sound: Encryption is Key
Joe Todd, Head of Engineering at Chirp
EEtimes (October 25, 2019)
You can send data over audio and it just might be more secure than using RF.
Using acoustic networking to transfer data provides some unique benefits for a vast number of applications in a wide array of industries. Applications range from delivering a simple and low-cost entry system for public transport to facilitating peer-to-peer (P2P) payments between two connected parties. The fundamental properties of sound can work to enable a seamless exchange of data payloads across a range of physical environments.
While the usability and time-saving capabilities of data-over-sound are well-understood, there remains a question from those assessing the viability of implementing this type of data transmission into their operations: Can information being transmitted over sound be protected from nearby eavesdroppers? On one hand, audio seems to be more secure than IP-based connectivity, which hackers can remotely penetrate. To put the question to bed, let’s look at the characteristics of sound and how industry-standard encryption can be applied to acoustic data transfer, rendering it secure and safe from the ears of unwanted listeners (Figure 1).
E-mail This Article | Printer-Friendly Page |
Related Articles
- Hardware Security Requirements for Embedded Encryption Key Storage
- Secure Your Security Key in On-Chip SRAM: Techniques to avoid Data Remanance Attacks
- Data interface key to future apps
- Key considerations and challenges when choosing LDOs
- From a Lossless (~1.5:1) Compression Algorithm for Llama2 7B Weights to Variable Precision, Variable Range, Compressed Numeric Data Types for CNNs and LLMs