Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Elements of information theory
Elements of information theory
Secret-key reconciliation by public discussion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Wireless Communications
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
IEEE Transactions on Mobile Computing
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Tool release: gathering 802.11n traces with channel state information
ACM SIGCOMM Computer Communication Review
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
Authenticated secret key extraction using channel characteristics for body area networks
Proceedings of the 2012 ACM conference on Computer and communications security
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Secure interaction with piggybacked key-exchange
Pervasive and Mobile Computing
Hi-index | 0.00 |
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wireless devices in proximity to securely pair with one another autonomously by generating a common cryptographic key directly from their shared time-varying wireless environment. The shared key synthesized by ProxiMate can be used by the devices to authenticate each others' physical proximity and then to communicate confidentially. Unlike traditional pairing approaches such as Diffie-Hellman, ProxiMate is secure against a computationally unbounded adversary and its computational complexity is linear in the size of the key. We evaluate ProxiMate using an experimental prototype built using an open-source software-defined platform and demonstrate its effectiveness in generating common secret bits. We further show that it is possible to speed up secret key synthesis by monitoring multiple RF sources simultaneously or by shaking together the devices that need to be paired. Finally, we show that ProxiMate is resistant to even the most powerful attacker who controls the public RF source used by the legitimate devices for pairing.