Abstract
Security methods have traditionally been deployed in the upper layers of the protocol stack. Therefore, the properties of the physical layer, like the wireless channel, have remained unexplored for authentication and confidentiality purposes. Some methods to expand the security mechanisms to lower levels have been suggested and thoroughly analyzed. The usage of the wireless channel for the development of key exchange protocols is based on two main properties: reciprocity and multipath propagation on fading channels. Several methods on how to extract and generate common secrecy using these properties have already been proposed. However, some security drawbacks have also been identified. In this paper, we propose to increase the security of these techniques by additionally utilizing hardware-related properties, namely the impairments in the transceivers’ local oscillators. The validation of this technique is performed in an experimental setup using the USRP/GNU Radio software-defined radio platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aono, T., Higuchi, K., Taromaru, M., Ohira, T., Sasaoka, H.: Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme. In: The European Conference on Wireless Technology, pp. 173–176, October 2005
Bloch, M., Barros, J.: Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Garcia-Luna-Aceves, et al. [GLASS08], pp. 116–127
Croft, J.: Patwari, N., Kasera, S.K.: Robust uncorrelated bit extraction methodologies for wireless sensors. In: IPSN, pp. 70–81 (2010)
Döttling, N., Lazich, D., Müller-Quade, J., de Almeida, A.S.: Vulnerabilities of wireless key exchange based on channel reciprocity. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol. 6513, pp. 206–220. Springer, Heidelberg (2011)
Eberz, S., Strohmeier, M., Wilhelm, M., Martinovic, I.: A practical man-in-the-middle attack on signal-based key generation protocols. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 235–252. Springer, Heidelberg (2012)
Garcia-Luna-Aceves, J.J., Sivakumar, R., Steenkiste, P. (eds.) Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, 14–19 September 2008. ACM (2008)
Hershey, J.E., Hassan, A.A., Yarlagadda, R.: Unconventional cryptographic keying variable management. IEEE Trans. Commun. 43, 3–6 (1995)
Hassan, A.A., Stark, W.E., Hershey, J.E., Chennakeshu, S.: Cryptographic key agreement for mobile radio. Digital Sig. Process. 6, 207–212 (1996)
Janssen, G.J.: Short range propagation measurements at 2.4, 4.5 and 11.5 GHz in indoor and outdoor environments, May 1992
Mathur, S., Trappe, W., Mandayam, N.B., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Garcia-Luna-Aceves, et al. [GLASS08], pp. 128–139
Premnath, S.N., Jana, S., Croft, J., Lakshmane Gowda, P., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)
Sun, C., Hirata, A., Ohira, T., Karmakar, N.C.: Fast beamforming of electronically steerable parasitic array radiator antennas: theory and experiment. In: IEEE Transactions on Antennas and Propagation, pp. 1819–1832, July 2004
Tse, D., Viswanath, P.: Fundamentals of Wireless Communication. Cambridge University Press, Cambridge (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Müller-Quade, J., de Almeida, A.S. (2015). Wireless Key Exchange Using Frequency Impairments. In: Rhee, KH., Yi, J. (eds) Information Security Applications. WISA 2014. Lecture Notes in Computer Science(), vol 8909. Springer, Cham. https://doi.org/10.1007/978-3-319-15087-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-319-15087-1_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15086-4
Online ISBN: 978-3-319-15087-1
eBook Packages: Computer ScienceComputer Science (R0)