Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach

Ihsen Alouani
{"title":"Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach","authors":"Ihsen Alouani","doi":"10.1109/DSD57027.2022.00058","DOIUrl":null,"url":null,"abstract":"Several systems and application domains are under-going disruptive transformations due to the recent breakthroughs in computing paradigms such us Machine Learning and commu-nication technologies such as 5G and beyond. Intelligent trans-portation systems is one of the flagship domains that witnessed drastic transformations through the development of ML-based environment perception along with Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Such connected, intelligent and collaborative transportation systems represent a promising trend towards smart roads and cities. However, the safety-critical aspect of these cyber-physical systems requires a systematic study of their security and privacy. In fact, security-sensitive information could be transmitted between vehicles, or between vehicles and the infrastructure such as security alerts, payment, etc. Since asymmetric cryptography is heavy to implement on embedded time-critical devices, in addition to the complexity of PKI-based solutions, symmetric cryptography offers confidentiality along with high performance. However, cryptographic key generation and establishment in symmetric cryptosystems is a great challenge. Recent work proposed a key generation and establishment protocol for ve-hicular communication that is based on the reciprocity and high spatial and temporal variation properties of the vehicular communication channel. This paper investigates the limitations of such channel-based key generation protocols. Based on a channel model with a machine learning approach, we show the possibility for a passive eavesdropper to compromise the secret key in a practical manner, thereby undermining the security of such key establishment technique. Moreover, we propose a defense based on adversarial machine learning to overcome this limit.","PeriodicalId":211723,"journal":{"name":"2022 25th Euromicro Conference on Digital System Design (DSD)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 25th Euromicro Conference on Digital System Design (DSD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DSD57027.2022.00058","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Several systems and application domains are under-going disruptive transformations due to the recent breakthroughs in computing paradigms such us Machine Learning and commu-nication technologies such as 5G and beyond. Intelligent trans-portation systems is one of the flagship domains that witnessed drastic transformations through the development of ML-based environment perception along with Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Such connected, intelligent and collaborative transportation systems represent a promising trend towards smart roads and cities. However, the safety-critical aspect of these cyber-physical systems requires a systematic study of their security and privacy. In fact, security-sensitive information could be transmitted between vehicles, or between vehicles and the infrastructure such as security alerts, payment, etc. Since asymmetric cryptography is heavy to implement on embedded time-critical devices, in addition to the complexity of PKI-based solutions, symmetric cryptography offers confidentiality along with high performance. However, cryptographic key generation and establishment in symmetric cryptosystems is a great challenge. Recent work proposed a key generation and establishment protocol for ve-hicular communication that is based on the reciprocity and high spatial and temporal variation properties of the vehicular communication channel. This paper investigates the limitations of such channel-based key generation protocols. Based on a channel model with a machine learning approach, we show the possibility for a passive eavesdropper to compromise the secret key in a practical manner, thereby undermining the security of such key establishment technique. Moreover, we propose a defense based on adversarial machine learning to overcome this limit.
打破(和修复)基于信道的加密密钥生成:机器学习方法
由于最近在机器学习和通信技术(如5G等)等计算范式方面的突破,一些系统和应用领域正在经历颠覆性的变革。随着基于机器学习的环境感知技术以及车对车(V2V)和车对基础设施(V2I)通信协议的发展,智能交通系统是见证了巨大变革的旗舰领域之一。这种互联、智能和协作的交通系统代表了智能道路和智能城市的发展趋势。然而,这些网络物理系统的安全关键方面需要对其安全性和隐私进行系统研究。事实上,安全敏感信息可以在车辆之间或车辆与基础设施之间传输,例如安全警报、支付等。由于在嵌入式时间关键型设备上实现非对称加密非常困难,除了基于pki的解决方案的复杂性之外,对称加密还提供了机密性和高性能。然而,在对称密码系统中,密钥的生成和建立是一个巨大的挑战。基于车辆通信信道的互易性和高时空变化特性,提出了一种车辆通信密钥生成和建立协议。本文研究了这种基于信道的密钥生成协议的局限性。基于具有机器学习方法的通道模型,我们展示了被动窃听者以实际方式泄露密钥的可能性,从而破坏了这种密钥建立技术的安全性。此外,我们提出了一种基于对抗性机器学习的防御来克服这一限制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信