Nothing Special   »   [go: up one dir, main page]

Skip to main content

AmbiSec: Securing Smart Spaces Using Entropy Harvesting

  • Conference paper
Ambient Intelligence (AmI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6439))

Included in the following conference series:

  • 1665 Accesses

Abstract

Following the vision of Ambient Intelligence (AmI), this paper introduces and evaluates a novel security scheme that takes the advantage of the unpredictable and erratic behavior of wireless communication to generate secret keys. The main advantage is that the secret key generation is applicable to every wireless device, independently of their hardware characteristics as it only requires a wireless interface and a human movement, which inherently affects the signal propagation within the physical environment. To analyze the applicability of this scheme, we implement and systematically evaluate the key generation using a wireless sensor network deployed in a real-world scenario. The analysis clarifies how different factors influence the amount of randomness collected from the physical environment, and it also shows that guessing attacks from an eavesdropper are negligible even if it is able to eavesdrop the complete wireless communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aono, T., Higuchi, K., Taromaru, M., Ohira, T., Sasaoka, H.: Experiments of IEEE 802.15.4 ESPARSKey (Encryption Scheme Parasite Array Radiator Secret Key) - RSSI Interleaving Scheme. In: IEICE Tech. Rep., Kyoto, vol. 105, pp. 31–36 (April 2005)

    Google Scholar 

  2. Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust Key Generation from Signal Envelopes in Wireless Networks. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 401–410. ACM, New York (2007)

    Google Scholar 

  3. Baronti, P., Pillai, P., Chook, V.W.C., Chessa, S., Gotta, A., Hu, Y.F.: Wireless sensor networks: A survey on the state of the art and the 802.15.4 and zigbee standards. Computer Communications 30(7), 1655–1695 (2007)

    Article  Google Scholar 

  4. Crossbow, http://www.xbow.com

  5. Girolami, M., Lenzi, S., Furfari, F., Chessa, S.: Sail: A sensor abstraction and integration layer for context awareness. In: EUROMICRO-SEAA, pp. 374–381 (2008)

    Google Scholar 

  6. Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: MobiCom 2009: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, pp. 321–332. ACM, New York (2009)

    Google Scholar 

  7. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In: MobiCom 2008: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 128–139. ACM, New York (2008)

    Google Scholar 

  8. Rappaport, T.: Wireless Communications: Principles and Practice. Prentice Hall PTR, Upper Saddle River (2001)

    MATH  Google Scholar 

  9. Wilhelm, M., Martinovic, I., Schmitt, J.B.: Secret keys from entangled sensor motes: implementation and analysis. In: Proceedings of the Third ACM Conference on Wireless Network Security (WiSec), pp. 139–144 (March 2010)

    Google Scholar 

  10. Wilson, R., Tse, D., Scholtz, R.A.: Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels. In: ICUWB 2007: IEEE International Conference on Ultra-Wideband, pp. 270–275 (September 2007)

    Google Scholar 

  11. Zeng, K., Wu, D., Chan, A., Mahapatra, P.: Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks. In: Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), San Diego, CA (March 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Barsocchi, P., Chessa, S., Martinovic, I., Oligeri, G. (2010). AmbiSec: Securing Smart Spaces Using Entropy Harvesting. In: de Ruyter, B., et al. Ambient Intelligence. AmI 2010. Lecture Notes in Computer Science, vol 6439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16917-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16917-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16916-8

  • Online ISBN: 978-3-642-16917-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics