Abstract
Following the vision of Ambient Intelligence (AmI), this paper introduces and evaluates a novel security scheme that takes the advantage of the unpredictable and erratic behavior of wireless communication to generate secret keys. The main advantage is that the secret key generation is applicable to every wireless device, independently of their hardware characteristics as it only requires a wireless interface and a human movement, which inherently affects the signal propagation within the physical environment. To analyze the applicability of this scheme, we implement and systematically evaluate the key generation using a wireless sensor network deployed in a real-world scenario. The analysis clarifies how different factors influence the amount of randomness collected from the physical environment, and it also shows that guessing attacks from an eavesdropper are negligible even if it is able to eavesdrop the complete wireless communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aono, T., Higuchi, K., Taromaru, M., Ohira, T., Sasaoka, H.: Experiments of IEEE 802.15.4 ESPARSKey (Encryption Scheme Parasite Array Radiator Secret Key) - RSSI Interleaving Scheme. In: IEICE Tech. Rep., Kyoto, vol. 105, pp. 31–36 (April 2005)
Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust Key Generation from Signal Envelopes in Wireless Networks. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 401–410. ACM, New York (2007)
Baronti, P., Pillai, P., Chook, V.W.C., Chessa, S., Gotta, A., Hu, Y.F.: Wireless sensor networks: A survey on the state of the art and the 802.15.4 and zigbee standards. Computer Communications 30(7), 1655–1695 (2007)
Crossbow, http://www.xbow.com
Girolami, M., Lenzi, S., Furfari, F., Chessa, S.: Sail: A sensor abstraction and integration layer for context awareness. In: EUROMICRO-SEAA, pp. 374–381 (2008)
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: MobiCom 2009: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, pp. 321–332. ACM, New York (2009)
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In: MobiCom 2008: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 128–139. ACM, New York (2008)
Rappaport, T.: Wireless Communications: Principles and Practice. Prentice Hall PTR, Upper Saddle River (2001)
Wilhelm, M., Martinovic, I., Schmitt, J.B.: Secret keys from entangled sensor motes: implementation and analysis. In: Proceedings of the Third ACM Conference on Wireless Network Security (WiSec), pp. 139–144 (March 2010)
Wilson, R., Tse, D., Scholtz, R.A.: Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels. In: ICUWB 2007: IEEE International Conference on Ultra-Wideband, pp. 270–275 (September 2007)
Zeng, K., Wu, D., Chan, A., Mahapatra, P.: Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks. In: Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), San Diego, CA (March 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Barsocchi, P., Chessa, S., Martinovic, I., Oligeri, G. (2010). AmbiSec: Securing Smart Spaces Using Entropy Harvesting. In: de Ruyter, B., et al. Ambient Intelligence. AmI 2010. Lecture Notes in Computer Science, vol 6439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16917-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-16917-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16916-8
Online ISBN: 978-3-642-16917-5
eBook Packages: Computer ScienceComputer Science (R0)