Radio-telepathy: extracting a secret key from an unauthenticated wireless channel

Suhas Mathur, W. Trappe, N. Mandayam, Chunxuan Ye, A. Reznik
{"title":"Radio-telepathy: extracting a secret key from an unauthenticated wireless channel","authors":"Suhas Mathur, W. Trappe, N. Mandayam, Chunxuan Ye, A. Reznik","doi":"10.1145/1409944.1409960","DOIUrl":null,"url":null,"abstract":"Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to support security services (such as encryption) between two users. Our algorithm uses level-crossings and quantization to extract bits from correlated stochastic processes. The resulting protocol resists cryptanalysis by an eavesdropping adversary and a spoofing attack by an active adversary without requiring an authenticated channel, as is typically assumed in prior information-theoretic key establishment schemes. We evaluate our algorithm through theoretical and numerical studies, and provide validation through two complementary experimental studies. First, we use an 802.11 development platform with customized logic that extracts raw channel impulse response data from the preamble of a format-compliant 802.11a packet. We show that it is possible to practically achieve key establishment rates of ~ 1 bit/sec in a real, indoor wireless environment. To illustrate the generality of our method, we show that our approach is equally applicable to per-packet coarse signal strength measurements using off-the-shelf 802.11 hardware.","PeriodicalId":378295,"journal":{"name":"ACM/IEEE International Conference on Mobile Computing and Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"714","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM/IEEE International Conference on Mobile Computing and Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1409944.1409960","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 714

Abstract

Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to support security services (such as encryption) between two users. Our algorithm uses level-crossings and quantization to extract bits from correlated stochastic processes. The resulting protocol resists cryptanalysis by an eavesdropping adversary and a spoofing attack by an active adversary without requiring an authenticated channel, as is typically assumed in prior information-theoretic key establishment schemes. We evaluate our algorithm through theoretical and numerical studies, and provide validation through two complementary experimental studies. First, we use an 802.11 development platform with customized logic that extracts raw channel impulse response data from the preamble of a format-compliant 802.11a packet. We show that it is possible to practically achieve key establishment rates of ~ 1 bit/sec in a real, indoor wireless environment. To illustrate the generality of our method, we show that our approach is equally applicable to per-packet coarse signal strength measurements using off-the-shelf 802.11 hardware.
无线电心灵感应:从未经认证的无线信道中提取密钥
保护通信需要建立加密密钥,这在密钥管理基础设施并不总是存在的移动场景中是具有挑战性的。在本文中,我们提出了一种协议,允许两个用户通过利用无线信道的特殊属性来建立一个共同的加密密钥:任何双方之间的底层信道响应是唯一的,并且在空间上快速去相关。然后可以使用已建立的密钥来支持两个用户之间的安全服务(例如加密)。我们的算法使用平交道口和量化从相关随机过程中提取比特。由此产生的协议可以抵抗窃听对手的密码分析和活动对手的欺骗攻击,而不需要经过身份验证的通道,这在以前的信息论密钥建立方案中通常是假设的。我们通过理论和数值研究来评估我们的算法,并通过两个互补的实验研究提供验证。首先,我们使用具有自定义逻辑的802.11开发平台,从格式兼容的802.11a数据包的序言中提取原始通道脉冲响应数据。我们表明,在真实的室内无线环境中,实际上可以实现~ 1比特/秒的密钥建立速率。为了说明我们方法的通用性,我们展示了我们的方法同样适用于使用现成的802.11硬件的每包粗信号强度测量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信