Data Over Sound: Encryption is Key
Joe Todd, Head of Engineering at Chirp
EEtimes (October 25, 2019)
You can send data over audio and it just might be more secure than using RF.
Using acoustic networking to transfer data provides some unique benefits for a vast number of applications in a wide array of industries. Applications range from delivering a simple and low-cost entry system for public transport to facilitating peer-to-peer (P2P) payments between two connected parties. The fundamental properties of sound can work to enable a seamless exchange of data payloads across a range of physical environments.
While the usability and time-saving capabilities of data-over-sound are well-understood, there remains a question from those assessing the viability of implementing this type of data transmission into their operations: Can information being transmitted over sound be protected from nearby eavesdroppers? On one hand, audio seems to be more secure than IP-based connectivity, which hackers can remotely penetrate. To put the question to bed, let’s look at the characteristics of sound and how industry-standard encryption can be applied to acoustic data transfer, rendering it secure and safe from the ears of unwanted listeners (Figure 1).
E-mail This Article | Printer-Friendly Page |
Related Articles
- Hardware Security Requirements for Embedded Encryption Key Storage
- Secure Your Security Key in On-Chip SRAM: Techniques to avoid Data Remanance Attacks
- Data interface key to future apps
- Key considerations and challenges when choosing LDOs
- From a Lossless (~1.5:1) Compression Algorithm for Llama2 7B Weights to Variable Precision, Variable Range, Compressed Numeric Data Types for CNNs and LLMs
New Articles
- Quantum Readiness Considerations for Suppliers and Manufacturers
- A Rad Hard ASIC Design Approach: Triple Modular Redundancy (TMR)
- Early Interactive Short Isolation for Faster SoC Verification
- The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification
- Advanced Packaging and Chiplets Can Be for Everyone
Most Popular
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- UPF Constraint coding for SoC - A Case Study
- Dynamic Memory Allocation and Fragmentation in C and C++
- Enhancing VLSI Design Efficiency: Tackling Congestion and Shorts with Practical Approaches and PnR Tool (ICC2)