Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2939918.2939923acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet

Published: 18 July 2016 Publication History

Abstract

In this work, we constructively combine adaptive wormholes with channel-reciprocity based key establishment (CRKE), which has been proposed as a lightweight security solution for IoT devices and might be even more important for the 5G Tactile Internet and its embedded low-end devices. We present a new secret key generation protocol where two parties compute shared cryptographic keys under narrow-band multi-path fading models over a delayed digital channel. The proposed approach furthermore enables distance-bounding the key establishment process via the coherence time dependencies of the wireless channel. Our scheme is thoroughly evaluated both theoretically and practically. For the latter, we used a testbed based on the IEEE 802.15.4 standard and performed extensive experiments in a real-world manufacturing environment. Additionally, we demonstrate adaptive wormhole attacks (AWOAs) and their consequences on several physical-layer security schemes. Furthermore, we proposed a countermeasure that minimizes the risk of AWOAs.

References

[1]
R. Ahlswede et al. Common randomness in information theory and cryptography. I. Secret sharing. IEEE J IT, 1993.
[2]
S. T. Ali et al. Zero reconciliation secret key generation for body-worn health monitoring devices. In Conference on Security and Privacy in Wireless and Mobile Networks, 2012.
[3]
A. Ambekar et al. Improving channel reciprocity for effective key management systems. In Signals, Systems, and Electronics, 2012.
[4]
J. G. Andrews et al. What will 5g be? IEEE Journal on Selected Areas in Communications, 2014.
[5]
T. Aono et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. Antennas and Propagation, 2005.
[6]
B. Azimi-Sadjadi et al. Robust key generation from signal envelopes in wireless networks. In Conference on Computer and Communications Security, 2007.
[7]
E. Barker et al. Recommendation for the entropy sources used for random bit generation. Draft NIST Special Publication, 2012.
[8]
E. Biglieri et al. MIMO Wireless Communications. 2010.
[9]
M. Bloch et al. Physical-Layer Security - From Information Theory to Security Engineering. 2011.
[10]
C. Chen et al. Secret key establishment using temporally and spatially correlated wireless channel coefficients. Mobile Computing, 2011.
[11]
H. Chen et al. On providing wormhole-attack-resistant localization using conflicting sets. Wireless Communications and Mobile Computing, 2015.
[12]
S. Eberz et al. A practical man-in-the-middle attack on signal-based key generation protocols. In European Symposium on Research in Computer Security, 2012.
[13]
G. Fettweis. The tactile internet: Applications and challenges. Vehicular Technology Magazine, IEEE, 2014.
[14]
S. T. B. Hamida et al. An adaptive quantization algorithm for secret key generation using radio channel measurements. In Conference on New Technologies, Mobility and Security, 2009.
[15]
T. Hayajneh et al. Secure neighborhood creation in wireless ad hoc networks using hop count discrepancies. MONET, 2012.
[16]
X. He et al. Two-hop secure communication using an untrusted relay: A case for cooperative jamming. In Global Communications Conference, 2008.
[17]
Y. Hu et al. Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE, 2006.
[18]
Y.-C. Hu et al. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In Workshop on Wireless Security, 2003.
[19]
S. Jain et al. Wormhole detection using channel characteristics. In International Conference on Communications, IEEE, 2012.
[20]
S. Jana et al. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Conference on Mobile Computing and Networking, 2009.
[21]
F. I. Khan et al. Wormhole attack prevention mechanism for RPL based LLN network. In Ubiquitous and Future Networks, 2013.
[22]
A. Kraskov et al. Estimating mutual information. Phys. Rev. E, 2004.
[23]
K. Krentz et al. 6lowpan security: Avoiding hidden wormholes using channel reciprocity. In Workshop on Trustworthy Embedded Devices, 2014.
[24]
K. Krentz and G. Wunder. 6lowpan security: Avoiding hidden wormholes using channel reciprocity. In Trustworthy Embedded Devices, TrustED, 2014.
[25]
L. Lai et al. Cooperative key generation in wireless networks. IEEE Journal on Selected Areas in Communications, 2012.
[26]
Z. Li et al. Securing wireless systems via lower layer enforcements. In Workshop on Wireless security, 2006.
[27]
H. Liu et al. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In IEEE INFOCOM, 2012.
[28]
M. Madiseh et al. Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation. IEEE J IFS, 2012.
[29]
S. Mathur et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Conference on Mobile Computing and Networking, 2008.
[30]
M. McGuire et al. Bounds on secret key rates in fading channels under practical channel estimation schemes. In International Conference on Communications, IEEE, 2014.
[31]
N. Patwari et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mob. Comput., 2010.
[32]
A. Pierrot et al. Practical limitations of secret-key generation in narrowband wireless environments. arXiv preprint arXiv:1312.3304, 2014.
[33]
G. S. Smith. A direct derivation of a single-antenna reciprocity relation for the time domain. Antennas and Propagation, 2004.
[34]
S. Song et al. Statistical wormhole detection for mobile sensor networks. In ICUFN, 2012.
[35]
C. D. T. Thai et al. Physical-layer secret key generation with untrusted relays. In IEEE GLOBECOM Workshops, 2014.
[36]
C. D. T. Thai et al. Physical-layer secret key generation with colluding untrusted relays. Wireless Communications, 2016.
[37]
M. A. Tope et al. Unconditionally secure communications over fading channels. In Military Communications Conference, 2001.
[38]
W. Trappe et al. Low-energy security: Limits and opportunities in the internet of things. IEEE Security & Privacy, 2015.
[39]
T. Tsao et al. A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs). Technical report, IETF, 2015.
[40]
J. W. Wallace et al. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis. Information Forensics and Security, 2010.
[41]
Q. Wang et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In Conference on Computer Communications, 2011.
[42]
J. WC Jr. Microwave mobile communications, 1974.
[43]
M. Wilhelm et al. Secret keys from entangled sensor motes: implementation and analysis. In Conference on Wireless Network Security, 2010.
[44]
R. Wilson et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels. IEEE J IFS, 2007.
[45]
C. Ye et al. Information-theoretically secret key generation for fading wireless channels. Information Forensics and Security, 2010.
[46]
C. T. Zenger et al. A novel key generating architecture for wireless low-resource devices. In Workshop on Secure Internet of Things, 2014.
[47]
C. T. Zenger et al. Exploiting the physical environment for securing the internet of things. In New Security Paradigms Workshop, 2015.
[48]
C. T. Zenger et al. On-line entropy estimation for secure information reconciliation. In Workshop on Wireless Communication Security at the Physical Layer, 2015.
[49]
C. T. Zenger et al. Preventing Relay Attacks and Providing Perfect Forward Secrecy using PHYSEC on 8-bit -- C. In IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016.
[50]
J. Zhang et al. Mobility assisted secret key generation using wireless link signatures. In Conference on Computer Communications, 201

Cited By

View all
  • (2021)From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A SurveyApplied Sciences10.3390/app1117811711:17(8117)Online publication date: 31-Aug-2021
  • (2021)A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency NetworksACM Transactions on Internet Technology10.1145/341910321:4(1-30)Online publication date: 16-Jul-2021
  • (2021)A Comprehensive Survey of the Tactile Internet: State-of-the-Art and Research DirectionsIEEE Communications Surveys & Tutorials10.1109/COMST.2020.302599523:1(472-523)Online publication date: Sep-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
July 2016
242 pages
ISBN:9781450342704
DOI:10.1145/2939918
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 5g
  2. adaptive wormhole
  3. channel reciprocity-based key establishment
  4. internet of things
  5. tactile internet
  6. untrusted relay
  7. wireless physical-layer security

Qualifiers

  • Research-article

Conference

WiSec'16
Sponsor:

Acceptance Rates

WiSec '16 Paper Acceptance Rate 13 of 51 submissions, 25%;
Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)2
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A SurveyApplied Sciences10.3390/app1117811711:17(8117)Online publication date: 31-Aug-2021
  • (2021)A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency NetworksACM Transactions on Internet Technology10.1145/341910321:4(1-30)Online publication date: 16-Jul-2021
  • (2021)A Comprehensive Survey of the Tactile Internet: State-of-the-Art and Research DirectionsIEEE Communications Surveys & Tutorials10.1109/COMST.2020.302599523:1(472-523)Online publication date: Sep-2022
  • (2019)Model Mediation to Overcome Light Limitations—Toward a Secure Tactile Internet SystemJournal of Sensor and Actuator Networks10.3390/jsan80100068:1(6)Online publication date: 2-Jan-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media