Nothing Special   »   [go: up one dir, main page]

Skip to main content

Wireless Key Exchange Using Frequency Impairments

  • Conference paper
  • First Online:
Information Security Applications (WISA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8909))

Included in the following conference series:

  • 1383 Accesses

Abstract

Security methods have traditionally been deployed in the upper layers of the protocol stack. Therefore, the properties of the physical layer, like the wireless channel, have remained unexplored for authentication and confidentiality purposes. Some methods to expand the security mechanisms to lower levels have been suggested and thoroughly analyzed. The usage of the wireless channel for the development of key exchange protocols is based on two main properties: reciprocity and multipath propagation on fading channels. Several methods on how to extract and generate common secrecy using these properties have already been proposed. However, some security drawbacks have also been identified. In this paper, we propose to increase the security of these techniques by additionally utilizing hardware-related properties, namely the impairments in the transceivers’ local oscillators. The validation of this technique is performed in an experimental setup using the USRP/GNU Radio software-defined radio platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Aono, T., Higuchi, K., Taromaru, M., Ohira, T., Sasaoka, H.: Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme. In: The European Conference on Wireless Technology, pp. 173–176, October 2005

    Google Scholar 

  2. Bloch, M., Barros, J.: Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)

    Book  Google Scholar 

  3. Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Garcia-Luna-Aceves, et al. [GLASS08], pp. 116–127

    Google Scholar 

  4. Croft, J.: Patwari, N., Kasera, S.K.: Robust uncorrelated bit extraction methodologies for wireless sensors. In: IPSN, pp. 70–81 (2010)

    Google Scholar 

  5. Döttling, N., Lazich, D., Müller-Quade, J., de Almeida, A.S.: Vulnerabilities of wireless key exchange based on channel reciprocity. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol. 6513, pp. 206–220. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Eberz, S., Strohmeier, M., Wilhelm, M., Martinovic, I.: A practical man-in-the-middle attack on signal-based key generation protocols. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 235–252. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  7. Garcia-Luna-Aceves, J.J., Sivakumar, R., Steenkiste, P. (eds.) Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, 14–19 September 2008. ACM (2008)

    Google Scholar 

  8. http://www.gnuradio.org

  9. Hershey, J.E., Hassan, A.A., Yarlagadda, R.: Unconventional cryptographic keying variable management. IEEE Trans. Commun. 43, 3–6 (1995)

    Article  MATH  Google Scholar 

  10. Hassan, A.A., Stark, W.E., Hershey, J.E., Chennakeshu, S.: Cryptographic key agreement for mobile radio. Digital Sig. Process. 6, 207–212 (1996)

    Article  Google Scholar 

  11. Janssen, G.J.: Short range propagation measurements at 2.4, 4.5 and 11.5 GHz in indoor and outdoor environments, May 1992

    Google Scholar 

  12. Mathur, S., Trappe, W., Mandayam, N.B., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Garcia-Luna-Aceves, et al. [GLASS08], pp. 128–139

    Google Scholar 

  13. Premnath, S.N., Jana, S., Croft, J., Lakshmane Gowda, P., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)

    Article  Google Scholar 

  14. Sun, C., Hirata, A., Ohira, T., Karmakar, N.C.: Fast beamforming of electronically steerable parasitic array radiator antennas: theory and experiment. In: IEEE Transactions on Antennas and Propagation, pp. 1819–1832, July 2004

    Google Scholar 

  15. Tse, D., Viswanath, P.: Fundamentals of Wireless Communication. Cambridge University Press, Cambridge (2005)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Antonio Sobreira de Almeida .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Müller-Quade, J., de Almeida, A.S. (2015). Wireless Key Exchange Using Frequency Impairments. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15087-1_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15086-4

  • Online ISBN: 978-3-319-15087-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics