Pseudo-random generation from one-way functions
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Secret-key reconciliation by public discussion
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Secure Device Pairing based on a Visual Channel (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
HAPADEP: Human-Assisted Pure Audio Device Pairing
ISC '08 Proceedings of the 11th international conference on Information Security
Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices
IEEE Transactions on Mobile Computing
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Secret keys from entangled sensor motes: implementation and analysis
Proceedings of the third ACM conference on Wireless network security
Robust uncorrelated bit extraction methodologies for wireless sensors
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Choosing key sizes for cryptography
Information Security Tech. Report
AmbiSec: securing smart spaces using entropy harvesting
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
New directions in cryptography
IEEE Transactions on Information Theory
Computing Binary Combinatorial Gray Codes Via Exhaustive Search With SAT Solvers
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Pairwise secret key establishment leveraging properties of the wireless channel, is an effective security means in scenarios where no common secret or PKI is available. Related work has shown that secret bit streams can be extracted from, e.g., signal strength ratio measurement between two peers. However, they all require a considerable amount of computing resources by the two parties. In this paper we present SHAKE, a novel algorithm to establish a key using the physical properties of the wireless channel. SHAKE is particularly suitable for scenarios where the two peers have very diverse computational resources. For example, SHAKE can be used to establish a key between a sensor and the sink in a Wireless Sensor Network. We show that a secret key can be established shifting the computational burden on one peer while the other party only require one hash evaluation, what can be afforded by any resource constrained device. We evaluate SHAKE through theoretical analysis and provide validation through real world measurements. According to our experiments, the proposed protocol generates high-entropy bit at remarkable rates and enjoys minimal computational complexity requirements at one of the two parties.