Pseudo-random generation from one-way functions
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
ACM SIGACT News - A special issue on cryptography
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios
CNSR '08 Proceedings of the Communication Networks and Services Research Conference
Space-time wireless channels
On fast and accurate detection of unauthorized wireless access points using clock skews
Proceedings of the 14th ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
Unconditionally secure key agreement and the intrinsic conditional information
IEEE Transactions on Information Theory
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Robust uncorrelated bit extraction methodologies for wireless sensors
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Mobility assisted secret key generation using wireless link signatures
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secret key extraction in MIMO-like sensor networks using wireless signal strength
ACM SIGMOBILE Mobile Computing and Communications Review
AmbiSec: securing smart spaces using entropy harvesting
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
On passive inference attacks against physical-layer key extraction?
Proceedings of the Fourth European Workshop on System Security
ProxiMate: proximity-based secure pairing using ambient wireless signals
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Investigation of signal and message manipulations on the wireless channel
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Zero reconciliation secret key generation for body-worn health monitoring devices
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Improving secret key generation performance for on-body devices
Proceedings of the 6th International Conference on Body Area Networks
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Creating shared secrets out of thin air
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Secure ad hoc trust initialization and key management in wireless body area networks
ACM Transactions on Sensor Networks (TOSN)
Limitations of generating a secret key using wireless fading under active adversary
IEEE/ACM Transactions on Networking (TON)
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Dhwani: secure peer-to-peer acoustic NFC
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Creating secrets out of erasures
Proceedings of the 19th annual international conference on Mobile computing & networking
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems
From RSSI to CSI: Indoor localization via channel response
ACM Computing Surveys (CSUR)
Channel information based cryptography and authentication in wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
Multi-user wireless channel probing for shared key generation with a fuzzy controller
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. We use real world measurements of RSS in a variety of environments and settings. Our experimental results show that (i) in certain environments, due to lack of variations in the wireless channel, the extracted bits have very low entropy making these bits unsuitable for a secret key, (ii) an adversary can cause predictable key generation in these static environments, and (iii) in dynamic scenarios where the two devices are mobile, and/or where there is a significant movement in the environment, high entropy bits are obtained fairly quickly. Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive lossy quantizer in conjunction with Cascade-based information reconciliation [7] and privacy amplification [14]. Our measurements show that our scheme, in comparison to the existing ones that we evaluate, performs the best in terms of generating high entropy bits at a high bit rate. The secret key bit streams generated by our scheme also pass the randomness tests of the NIST test suite [21] that we conduct.