On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping