A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols

@inproceedings{Eberz2012APM,
  title={A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols},
  author={Simon Eberz and Martin Strohmeier and Matthias Wilhelm and Ivan Martinovic},
  booktitle={ESORICS},
  year={2012}
}
Generating secret keys using physical properties of the wireless channel has recently become a popular research area. The main security assumption of these protocols is that a sufficiently distant adversary is unable to guess a generated secret due to the unpredictable behavior of multipath signal propagation. In this paper, we introduce a practical and efficient man-in-the-middle attack against such protocols. Using this attack, we demonstrate: (i) intentional sabotaging of key generation… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 35 CITATIONS

Authenticated key establishment for low-resource devices exploiting correlated random channels

  • Computer Networks
  • 2016
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Proximity-Based Security Techniques for Mobile Users in Wireless Networks

  • IEEE Transactions on Information Forensics and Security
  • 2013
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

An Investigation of Using Loop-Back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation

  • IEEE Transactions on Mobile Computing
  • 2019
VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND

Phase Jamming Attack: A Practical Attack on Physical layer-Based Key Derivation

  • 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Implementing a real-time capable WPLS testbed for independent performance and security analyses

  • 2017 51st Asilomar Conference on Signals, Systems, and Computers
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 20 REFERENCES

An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements

  • 2009 3rd International Conference on New Technologies, Mobility and Security
  • 2009
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Information-Theoretically Secret Key Generation for Fading Wireless Channels

  • IEEE Transactions on Information Forensics and Security
  • 2009
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL