{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T04:45:04Z","timestamp":1771649104595,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s10776-019-00473-4","type":"journal-article","created":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T09:02:57Z","timestamp":1573635777000},"page":"45-59","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Acoustic-Based Security: A Key Enabling Technology for Wireless Sensor Networks"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1024-9470","authenticated-orcid":false,"given":"S.","family":"Soderi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,13]]},"reference":[{"key":"473_CR1","unstructured":"Breach level index. https:\/\/breachlevelindex.com."},{"key":"473_CR2","unstructured":"Cost of a Data Breach Study. https:\/\/www.ibm.com\/security\/data-breach."},{"key":"473_CR3","unstructured":"Dropbox. https:\/\/www.dropbox.com."},{"key":"473_CR4","unstructured":"Equifax. https:\/\/www.equifax.com\/personal."},{"key":"473_CR5","unstructured":"Experian. https:\/\/www.experian.com."},{"key":"473_CR6","unstructured":"Gemalto. https:\/\/www.gemalto.com."},{"key":"473_CR7","unstructured":"LinkedIn. https:\/\/www.linkedin.com."},{"key":"473_CR8","unstructured":"MathWorks. http:\/\/www.mathworks.com."},{"key":"473_CR9","unstructured":"Report: Healthcare Industry Workers Lack Basic Cybersecurity Awareness. https:\/\/www.healthcare-informatics.com\/news-item\/cybersecurity\/report-healthcare-employees-are-low-hanging-fruit-social-engineering-attacks."},{"key":"473_CR10","unstructured":"The Worst Data Breaches of the Last 10 Years. https:\/\/www.asecurelife.com\/the-worst-data-breaches-of-the-last-10-years."},{"key":"473_CR11","doi-asserted-by":"publisher","unstructured":"IEEE Standard for Local and metropolitan area networks\u2014Part 15.6: Wireless Body Area Networks, 2012. https:\/\/doi.org\/10.1109\/IEEESTD.2012.6161600.","DOI":"10.1109\/IEEESTD.2012.6161600"},{"key":"473_CR12","volume-title":"Security Engineering\u2014A Guide to Building Dependable Distributed Systems","author":"RJ Anderson","year":"2008","unstructured":"R. J. Anderson, Security Engineering\u2014A Guide to Building Dependable Distributed Systems, vol. 2nd, WileyNew York, 2008.","edition":"2"},{"issue":"3","key":"473_CR13","doi-asserted-by":"publisher","first-page":"43","DOI":"10.3390\/technologies5030043","volume":"5","author":"DB Arbia","year":"2017","unstructured":"D. B. Arbia, M. M. Alam, Y. L. Moullec and E. B. Hamida, Communication challenges in on-body and body-to-body wearable wireless networks\u2014a connectivity perspective, Technologies, Vol. 5, No. 3, p. 43, 2017. https:\/\/doi.org\/10.3390\/technologies5030043.","journal-title":"Technologies"},{"issue":"12","key":"473_CR14","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"I. J. Cox, J. Kilian, F. Leighton and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673\u20131687, 1997. https:\/\/doi.org\/10.1109\/83.650120.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"473_CR15","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"I. Csiszar and J. Korner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, Vol. 24, No. 3, pp. 339\u2013348, 1978. https:\/\/doi.org\/10.1109\/TIT.1978.1055892.","journal-title":"IEEE Transactions on Information Theory"},{"key":"473_CR16","unstructured":"L. Deshotels, Inaudible sound as a covert channel in mobile devices. In: 8th USENIX Workshop on Offensive Technologies (WOOT 14). USENIX Association. San Diego, CA, (2014). https:\/\/www.usenix.org\/conference\/woot14\/workshop-program\/presentation\/deshotels."},{"key":"473_CR17","doi-asserted-by":"publisher","unstructured":"M. Frustaci, P. Pace, and G. Aloi, Securing the IoT world: Issues and perspectives. In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN), pp. 246\u2013251, (2017). https:\/\/doi.org\/10.1109\/CSCN.2017.8088629.","DOI":"10.1109\/CSCN.2017.8088629"},{"issue":"4","key":"473_CR18","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","volume":"5","author":"M Frustaci","year":"2018","unstructured":"M. Frustaci, P. Pace, G. Aloi and G. Fortino, Evaluating critical security issues of the IoT world: present and future challenges, IEEE Internet of Things Journal, Vol. 5, No. 4, pp. 2483\u20132495, 2018. https:\/\/doi.org\/10.1109\/JIOT.2017.2767291.","journal-title":"IEEE Internet of Things Journal"},{"key":"473_CR19","unstructured":"M. Guri, Y. A. Solewicz, A. Daidakulov, and Y. Elovici, MOSQUITO: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication. CoRR abs\/1803.03422, 2018. arxiv:1803.03422."},{"key":"473_CR20","unstructured":"M. Hanspach, and M. Goetz, On covert acoustical mesh networks in air. CoRR abs\/1406.1213, 2014. arxiv:1406.1213."},{"issue":"5","key":"473_CR21","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2013.2265141","volume":"30","author":"W Harrison","year":"2013","unstructured":"W. Harrison, J. Almeida, M. Bloch, S. McLaughlin and J. Barros, Coding for secrecy: an overview of error-control coding techniques for physical-layer security, IEEE Signal Processing Magazine, Vol. 30, No. 5, pp. 41\u201350, 2013. https:\/\/doi.org\/10.1109\/MSP.2013.2265141.","journal-title":"IEEE Signal Processing Magazine"},{"key":"473_CR22","unstructured":"Z. Harvest, B. E. SqueakyChat, Ultrasonic communication using commercial notebook computers, 2014. https:\/\/github.com\/bonniee\/ultrasonic\/blob\/master\/SqueakyChat.pdf."},{"key":"473_CR23","unstructured":"S. Holm, O.B. Hovind, S. Rostad, and R. Holm. Indoors data communications using airborne ultrasound. In: Proceedings (ICASSP \u201905) IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005, vol. 3, pp. iii\/957\u2013iii\/960 Vol. 3, (2005)."},{"key":"473_CR24","volume-title":"Protocols and Architectures for Wireless Sensor Networks","author":"H Karl","year":"2007","unstructured":"H. Karl and A. Willig, Protocols and Architectures for Wireless Sensor Networks, Wiley-InterscienceNew York, NY, 2007."},{"key":"473_CR25","volume-title":"Cyberpower and National Security","author":"FD Kramer","year":"2009","unstructured":"F. D. Kramer and S. H. Starr, Cyberpower and National Security, Potomac BooksWashington, 2009."},{"issue":"4","key":"473_CR26","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1111\/faf.12277","volume":"19","author":"Friedrich Ladich","year":"2018","unstructured":"F. Ladich. Acoustic communication in fishes: temperature plays a role. Fish and Fisheries, Vol. 19, No. 4, pp. 598\u2013612. https:\/\/doi.org\/10.1111\/faf.12277. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1111\/faf.12277.","journal-title":"Fish and Fisheries"},{"issue":"10","key":"473_CR27","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"Butler W. Lampson","year":"1973","unstructured":"B.W. Lampson,. A note on the confinement problem. Commun. ACM, Vol. 16, No. 10, pp. 613\u2013615, 1973. http:\/\/doi.acm.org\/10.1145\/362375.362389.","journal-title":"Communications of the ACM"},{"issue":"4","key":"473_CR28","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"H Malvar","year":"2003","unstructured":"H. Malvar and D. Florencio, Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, Vol. 51, No. 4, pp. 898\u2013905, 2003. https:\/\/doi.org\/10.1109\/TSP.2003.809385.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"473_CR29","unstructured":"W. Mao, J. He, H. Zheng, Z. Zhang, and L. Qiu, High-precision acoustic motion tracking: Demo. In: Proceedings of the 22Nd Annual International Conference on Mobile Computing and Networking, MobiCom \u201916, pp. 491\u2013492. ACM, New York, NY, USA (2016). http:\/\/doi.acm.org\/10.1145\/2973750.2985617."},{"key":"473_CR30","unstructured":"C. Otto, A. Milenkovi\u0107, C. Sanders and E. Jovanov. System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob. Multimed., Vol. 1, No. 4, pp. 307\u2013326, 2005. http:\/\/dl.acm.org\/citation.cfm?id=2010498.2010502."},{"key":"473_CR31","unstructured":"J. G. Proakis, Digital Communications, 4th ed. McGraw-HillBoston, Boston, 2000. http:\/\/www.loc.gov\/catdir\/description\/mh021\/00025305.html."},{"key":"473_CR32","volume-title":"Fundamentals of Speech Recognition","author":"L Rabiner","year":"1993","unstructured":"L. Rabiner and B. H. Juang, Fundamentals of Speech Recognition, Prentice-Hall IncUpper Saddle River, NJ, 1993."},{"issue":"4","key":"473_CR33","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"C. Shannon, Communication theory of secrecy systems, The Bell System Technical Journal, Vol. 28, No. 4, pp. 656\u2013715, 1949. https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x.","journal-title":"The Bell System Technical Journal"},{"issue":"1","key":"473_CR34","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/JRPROC.1949.232969","volume":"37","author":"CE Shannon","year":"1949","unstructured":"C. E. Shannon, Communication in the presence of noise, Proceedings of the IRE, Vol. 37, No. 1, pp. 10\u201321, 1949. https:\/\/doi.org\/10.1109\/JRPROC.1949.232969.","journal-title":"Proceedings of the IRE"},{"key":"473_CR35","unstructured":"S. Soderi, Security in body networks: watermark-based communications on air-gap acoustic channel. In: 13th EAI International Conference on Body Area Networks (Bodynets2018). Oulu, Finland, 2018."},{"issue":"7","key":"473_CR36","doi-asserted-by":"publisher","first-page":"e3142","DOI":"10.1002\/ett.3142","volume":"28","author":"Simone Soderi","year":"2016","unstructured":"S. Soderi, L. Mucchi, M. H\u00e4m\u00e4l\u00e4inen, A. Piva, and J.H. Iinatti, Physical layer security based on spread-spectrum watermarking and jamming receiver. Transactions on Emerging Telecommunications Technologies, Vol. 28, No. 7, 2017. http:\/\/dblp.uni-trier.de\/db\/journals\/ett\/ett28.html#SoderiMHPI17.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"17","key":"473_CR37","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1002\/dac.3120","volume":"29","author":"M Toorani","year":"2016","unstructured":"M. Toorani, Security analysis of the IEEE 802.15.6 Standard, International Journal of Communication Systems, Vol. 29, No. 17, pp. 2471\u20132489, 2016. https:\/\/doi.org\/10.1002\/dac.3120.","journal-title":"International Journal of Communication Systems"},{"key":"473_CR38","unstructured":"Q. Wang, K. Ren, M. Zhou, T. Lei, D. Koutsonikolas, and L. Su, Messages behind the sound: real-time hidden acoustic signal capture with smartphones. In: Proceedings of the 22Nd Annual International Conference on Mobile Computing and Networking, MobiCom \u201916, pp. 29\u201341. ACM, New York, NY (2016). 10.1145\/2973750.2973765. http:\/\/doi.acm.org\/10.1145\/2973750.2973765."},{"issue":"8","key":"473_CR39","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A Wyner","year":"1975","unstructured":"A. Wyner, The wire-tap channel, The Bell System Technical Journal, Vol. 54, No. 8, pp. 1355\u20131387, 1975. https:\/\/doi.org\/10.1002\/j.1538-7305.1975.tb02040.x.","journal-title":"The Bell System Technical Journal"},{"issue":"1","key":"473_CR40","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/JIOT.2018.2850524","volume":"6","author":"Xiao Zhang","year":"2019","unstructured":"X. Zhang, J. Liu, S. Chen, Y. Kong, and K. Ren, PriWhisper+: An enhanced acoustic short-range communication system for smartphones. IEEE Internet of Things Journal, pp. 1\u20131, 2018. https:\/\/doi.org\/10.1109\/JIOT.2018.2850524.","journal-title":"IEEE Internet of Things Journal"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00473-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-019-00473-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00473-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:38:14Z","timestamp":1605141494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-019-00473-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,13]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["473"],"URL":"https:\/\/doi.org\/10.1007\/s10776-019-00473-4","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,13]]},"assertion":[{"value":"31 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}