Proceedings ArticleDOI
On the effectiveness of secret key extraction from wireless signal strength in real environments
Suman Jana,Sriram Nandha Premnath,Michael R. Clark,Sneha Kumar Kasera,Neal Patwari,Srikanth V. Krishnamurthy +5 more
- pp 321-332
TLDR
An environment adaptive secret key generation scheme that uses an adaptive lossy quantizer in conjunction with Cascade-based information reconciliation and privacy amplification is developed, which shows that the scheme performs the best in terms of generating high entropy bits at a high bit rate.Abstract:
We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. We use real world measurements of RSS in a variety of environments and settings. Our experimental results show that (i) in certain environments, due to lack of variations in the wireless channel, the extracted bits have very low entropy making these bits unsuitable for a secret key, (ii) an adversary can cause predictable key generation in these static environments, and (iii) in dynamic scenarios where the two devices are mobile, and/or where there is a significant movement in the environment, high entropy bits are obtained fairly quickly. Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive lossy quantizer in conjunction with Cascade-based information reconciliation [7] and privacy amplification [14]. Our measurements show that our scheme, in comparison to the existing ones that we evaluate, performs the best in terms of generating high entropy bits at a high bit rate. The secret key bit streams generated by our scheme also pass the randomness tests of the NIST test suite [21] that we conduct.read more
Citations
More filters
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Journal ArticleDOI
From RSSI to CSI: Indoor localization via channel response
Zheng Yang,Zimu Zhou,Yunhao Liu +2 more
TL;DR: In this article, the authors survey the channel state information (CSI) in 802.11 a/g/n and highlight the differences between CSI and RSSI with respect to network layering, time resolution, frequency resolution, stability, and accessibility.
Journal ArticleDOI
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
From RSSI to CSI: Indoor Localization via Channel Response, A survey on indoor localization using PHY-layer information
Yang Zheng,Zhou Zimu,Yunhao Liu +2 more
TL;DR: This article surveys the new trend of channel response in localization and investigates a large body of recent works and classify them overall into three categories according to how to use CSI, highlighting the differences between CSI and RSSI.
Journal ArticleDOI
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
TL;DR: A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
References
More filters
Journal ArticleDOI
A mathematical theory of communication
TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
ReportDOI
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
TL;DR: Some criteria for characterizing and selecting appropriate generators and some recommended statistical tests are provided, as a first step in determining whether or not a generator is suitable for a particular cryptographic application.
Book ChapterDOI
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Journal ArticleDOI
Secret key agreement by public discussion from common information
TL;DR: It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary asymmetric channels, even when the enemy's channel is superior to the other two channels.
Journal ArticleDOI
Wireless Information-Theoretic Security
TL;DR: A practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security and is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.