真实环境中物理层密钥提取的经验统计推理攻击

R. Zhu, Tao Shu, Huirong Fu
{"title":"真实环境中物理层密钥提取的经验统计推理攻击","authors":"R. Zhu, Tao Shu, Huirong Fu","doi":"10.1109/MILCOM.2017.8170755","DOIUrl":null,"url":null,"abstract":"Traditional cryptographic secret key establishment mechanisms are facing challenges with the fast growth of high-performance computing, and can be very costly in many settings, e.g. in wireless ad-hoc networks, since they consume scarce resources such as bandwidth and battery power. As an alternative, link-signature-based (LSB) secret key extraction techniques have received many interests in recent years. It is believed that these mechanisms are secure, based on the fundamental assumption that wireless signals received at two locations separated by more than half a wavelength apart are uncorrelated. However, recently it has been observed that in some circumstances this assumption does not hold, rendering LSB key extraction mechanisms vulnerable to attacks. This paper studies empirical statistical inference attacks (SIA) to LSB key extraction, whereby an attacker infers the signature of a target link, and henceforce recovers the secret key extracted from that signature, by observing the surrounding links. Different from prior work that assumes a theoretical link-correlation model for the inference, our study does not make any assumption on link correlation. Instead, ours is taking a machine learning method for link inference based on empirically measured link data. Machine learning (ML) algorithms are developed to launch SIA under various realistic scenarios. Our experiment results show that even without making assumptions on link correlation, the proposed inference algorithms are still quite effective, and can reduce the key search space by many orders of magnitudes compared to brutal force search.","PeriodicalId":113767,"journal":{"name":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Empirical statistical inference attack against PHY-layer key extraction in real environments\",\"authors\":\"R. Zhu, Tao Shu, Huirong Fu\",\"doi\":\"10.1109/MILCOM.2017.8170755\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Traditional cryptographic secret key establishment mechanisms are facing challenges with the fast growth of high-performance computing, and can be very costly in many settings, e.g. in wireless ad-hoc networks, since they consume scarce resources such as bandwidth and battery power. As an alternative, link-signature-based (LSB) secret key extraction techniques have received many interests in recent years. It is believed that these mechanisms are secure, based on the fundamental assumption that wireless signals received at two locations separated by more than half a wavelength apart are uncorrelated. However, recently it has been observed that in some circumstances this assumption does not hold, rendering LSB key extraction mechanisms vulnerable to attacks. This paper studies empirical statistical inference attacks (SIA) to LSB key extraction, whereby an attacker infers the signature of a target link, and henceforce recovers the secret key extracted from that signature, by observing the surrounding links. Different from prior work that assumes a theoretical link-correlation model for the inference, our study does not make any assumption on link correlation. Instead, ours is taking a machine learning method for link inference based on empirically measured link data. Machine learning (ML) algorithms are developed to launch SIA under various realistic scenarios. Our experiment results show that even without making assumptions on link correlation, the proposed inference algorithms are still quite effective, and can reduce the key search space by many orders of magnitudes compared to brutal force search.\",\"PeriodicalId\":113767,\"journal\":{\"name\":\"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2017.8170755\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2017.8170755","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

随着高性能计算的快速发展,传统的加密密钥建立机制面临着挑战,并且在许多情况下,例如在无线自组织网络中,由于它们消耗带宽和电池电量等稀缺资源,因此成本非常高。作为一种替代方案,基于链接签名的密钥提取技术近年来受到了广泛的关注。人们相信,这些机制是安全的,其基本假设是,在相隔半个波长以上的两个位置接收到的无线信号是不相关的。然而,最近观察到,在某些情况下,这种假设并不成立,使得LSB密钥提取机制容易受到攻击。本文研究了LSB密钥提取的经验统计推断攻击(SIA),攻击者通过观察周围的链路,推断目标链路的签名,从而强制恢复从该签名中提取的密钥。与以往的研究假设一个理论的关联模型进行推理不同,我们的研究没有对关联做任何假设。相反,我们正在采用基于经验测量的链接数据的机器学习方法进行链接推理。开发机器学习(ML)算法以在各种现实场景下启动SIA。我们的实验结果表明,即使不假设链接相关性,所提出的推理算法仍然是非常有效的,并且与野蛮力搜索相比,可以将关键字搜索空间减少许多个数量级。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Empirical statistical inference attack against PHY-layer key extraction in real environments
Traditional cryptographic secret key establishment mechanisms are facing challenges with the fast growth of high-performance computing, and can be very costly in many settings, e.g. in wireless ad-hoc networks, since they consume scarce resources such as bandwidth and battery power. As an alternative, link-signature-based (LSB) secret key extraction techniques have received many interests in recent years. It is believed that these mechanisms are secure, based on the fundamental assumption that wireless signals received at two locations separated by more than half a wavelength apart are uncorrelated. However, recently it has been observed that in some circumstances this assumption does not hold, rendering LSB key extraction mechanisms vulnerable to attacks. This paper studies empirical statistical inference attacks (SIA) to LSB key extraction, whereby an attacker infers the signature of a target link, and henceforce recovers the secret key extracted from that signature, by observing the surrounding links. Different from prior work that assumes a theoretical link-correlation model for the inference, our study does not make any assumption on link correlation. Instead, ours is taking a machine learning method for link inference based on empirically measured link data. Machine learning (ML) algorithms are developed to launch SIA under various realistic scenarios. Our experiment results show that even without making assumptions on link correlation, the proposed inference algorithms are still quite effective, and can reduce the key search space by many orders of magnitudes compared to brutal force search.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信