A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives

IF 2.3 4区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC
David Samuel Bhatti, Shahzad Saleem, Heung-No Lee, Ki-Il Kim
{"title":"A dynamic symmetric key generation at wireless link layer: information-theoretic perspectives","authors":"David Samuel Bhatti, Shahzad Saleem, Heung-No Lee, Ki-Il Kim","doi":"10.1186/s13638-024-02396-y","DOIUrl":null,"url":null,"abstract":"<p>The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges the possibility of breaches when adequate computational resources are available, that is why information-theoretic security is being explored, which suggests the existence of unbreakable cryptographic systems even in the presence of limitless processing power. Secret key exchange has traditionally relied on RSA or DH protocols, but researchers are now exploring innovative approaches for sharing secret keys among wireless network devices, leveraging physical or link layer characteristics. This research seeks to revolutionize secure multi-party key acquisition in wireless networks, capitalizing on information-theoretic security and collaborative data extraction. The proposed secret key generation framework comprehensively organizes and explains the information-theoretic aspects of secret key generation within the lower layers of wireless networks, especially the link layer, proposes a novel information-theoretic SKG framework for the dynamic acquisition of symmetric secret keys, and responds to contemporary information security challenges by relying on information-theory principles rather than vulnerable mathematical relationships in the post-quantum period. A new cryptographic key can be generated using a straightforward method, and when it is combined (XORed) with the previous key, it creates a continuously changing secret for encryption and decryption. This approach enhances security because, as attackers attempt to break the encryption, the system generates fresh, dynamic keys, making it progressively more challenging for them to succeed. The research work in question integrates key renewal, or how often keys are updated (dynamic keys), with a security off-period. It introduces a framework for determining the best key refresh rate based on the anticipated rate at which keys might be compromised. Furthermore, the proposed framework is scalable, allowing new nodes to quickly join the existing network. The system was tested with multiple nodes equipped with IEEE 802.11 interfaces, which were set in monitor mode to capture frames at the link layer. Nodes map their on-time frames onto their Bloom filters. Nodes exchange these Bloom filters in a feedback mechanism. Nodes extract those frames from their .pcap files, which are present in all Bloom filters; these are common frames among all nodes. These frames are used to form a shared secret that is passed to HMAC Key Derivation Function by each node to acquire the final encryption key of the required length. The validation of this encryption key is performed using a simple challenge-response protocol; upon successful validation, encrypted communication begins. Otherwise, the key generation process is restarted.</p>","PeriodicalId":12040,"journal":{"name":"EURASIP Journal on Wireless Communications and Networking","volume":"24 1","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"EURASIP Journal on Wireless Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1186/s13638-024-02396-y","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

The expansion of wireless communication introduces security vulnerabilities, emphasizing the essential need for secure systems that prioritize confidentiality, integrity, and other key aspects of data protection. Since computational security acknowledges the possibility of breaches when adequate computational resources are available, that is why information-theoretic security is being explored, which suggests the existence of unbreakable cryptographic systems even in the presence of limitless processing power. Secret key exchange has traditionally relied on RSA or DH protocols, but researchers are now exploring innovative approaches for sharing secret keys among wireless network devices, leveraging physical or link layer characteristics. This research seeks to revolutionize secure multi-party key acquisition in wireless networks, capitalizing on information-theoretic security and collaborative data extraction. The proposed secret key generation framework comprehensively organizes and explains the information-theoretic aspects of secret key generation within the lower layers of wireless networks, especially the link layer, proposes a novel information-theoretic SKG framework for the dynamic acquisition of symmetric secret keys, and responds to contemporary information security challenges by relying on information-theory principles rather than vulnerable mathematical relationships in the post-quantum period. A new cryptographic key can be generated using a straightforward method, and when it is combined (XORed) with the previous key, it creates a continuously changing secret for encryption and decryption. This approach enhances security because, as attackers attempt to break the encryption, the system generates fresh, dynamic keys, making it progressively more challenging for them to succeed. The research work in question integrates key renewal, or how often keys are updated (dynamic keys), with a security off-period. It introduces a framework for determining the best key refresh rate based on the anticipated rate at which keys might be compromised. Furthermore, the proposed framework is scalable, allowing new nodes to quickly join the existing network. The system was tested with multiple nodes equipped with IEEE 802.11 interfaces, which were set in monitor mode to capture frames at the link layer. Nodes map their on-time frames onto their Bloom filters. Nodes exchange these Bloom filters in a feedback mechanism. Nodes extract those frames from their .pcap files, which are present in all Bloom filters; these are common frames among all nodes. These frames are used to form a shared secret that is passed to HMAC Key Derivation Function by each node to acquire the final encryption key of the required length. The validation of this encryption key is performed using a simple challenge-response protocol; upon successful validation, encrypted communication begins. Otherwise, the key generation process is restarted.

Abstract Image

无线链路层动态对称密钥生成:信息论视角
无线通信的扩展带来了安全漏洞,强调了安全系统的基本需求,即优先考虑数据保护的保密性、完整性和其他关键方面。由于计算安全承认在有足够计算资源的情况下存在漏洞的可能性,这也是人们探索信息论安全的原因,信息论安全表明,即使在处理能力无限的情况下,也存在牢不可破的加密系统。密钥交换传统上依赖于 RSA 或 DH 协议,但研究人员现在正在探索利用物理层或链路层特性在无线网络设备之间共享密钥的创新方法。这项研究旨在利用信息论安全和协作数据提取技术,彻底改变无线网络中的多方密钥安全获取方式。所提出的秘钥生成框架全面组织和解释了无线网络底层(尤其是链路层)秘钥生成的信息论问题,提出了用于动态获取对称秘钥的新型信息论 SKG 框架,并在后量子时代依靠信息论原理而不是脆弱的数学关系来应对当代信息安全挑战。新的加密密钥可以用一种简单的方法生成,当它与之前的密钥结合(XOR)时,就会产生一个不断变化的用于加密和解密的秘密。这种方法增强了安全性,因为当攻击者试图破解加密时,系统会生成新的、动态的密钥,使攻击者的成功难度逐渐增加。相关研究工作将密钥更新或密钥更新频率(动态密钥)与安全关闭期结合起来。它引入了一个框架,根据密钥可能被泄露的预期速度来确定最佳密钥更新率。此外,建议的框架还具有可扩展性,允许新节点快速加入现有网络。该系统使用配备 IEEE 802.11 接口的多个节点进行了测试,这些节点被设置为监控模式,以便在链路层捕获帧。节点将其准时帧映射到其 Bloom 过滤器上。节点通过反馈机制交换这些 Bloom 过滤器。节点从自己的 .pcap 文件中提取存在于所有 Bloom 过滤器中的帧,这些帧是所有节点的共同帧。这些帧用于形成共享密文,每个节点将其传递给 HMAC 密钥推导函数,以获取所需长度的最终加密密钥。加密密钥的验证使用简单的挑战-响应协议进行;验证成功后,加密通信开始。否则,密钥生成过程将重新开始。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
7.70
自引率
3.80%
发文量
109
审稿时长
8.0 months
期刊介绍: The overall aim of the EURASIP Journal on Wireless Communications and Networking (EURASIP JWCN) is to bring together science and applications of wireless communications and networking technologies with emphasis on signal processing techniques and tools. It is directed at both practicing engineers and academic researchers. EURASIP Journal on Wireless Communications and Networking will highlight the continued growth and new challenges in wireless technology, for both application development and basic research. Articles should emphasize original results relating to the theory and/or applications of wireless communications and networking. Review articles, especially those emphasizing multidisciplinary views of communications and networking, are also welcome. EURASIP Journal on Wireless Communications and Networking employs a paperless, electronic submission and evaluation system to promote a rapid turnaround in the peer-review process. The journal is an Open Access journal since 2004.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信