Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization
@article{Pan2021ManintheMiddleAR, title={Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization}, author={Yanjun Pan and Ziqi Xu and Ming Li and Loukas Lazos}, journal={Proceedings of the Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing}, year={2021} }
Physical-layer based key generation schemes exploit the channel reciprocity for secret key extraction, which can achieve information-theoretic secrecy against eavesdroppers. Such methods, although practical, have been shown to be vulnerable against man-in-the-middle (MitM) attacks, where an active adversary, Mallory, can influence and infer part of the secret key generated between Alice and Bob by injecting her own packet upon observing highly correlated channel/RSS measurements from Alice andβ¦Β
Figures and Tables from this paper
4 Citations
Adversarial Reconfigurable Intelligent Surface Against Physical Layer Key Generation
- Computer Science
- 2022
This work shows an Eve-controlled adversarial RIS (Eve-RIS), by inserting into the legitimate channel a random and reciprocal channel, can partially reconstruct the secret keys from the legitimate PL-SKG process.
Star-specific Key-homomorphic PRFs from Linear Regression and Extremal Set Theory
- Mathematics, Computer ScienceArXiv
- 2022
We introduce a novel method to derandomize the learning with errors (LWE) problem by generating deterministic yet sufficiently independent LWE instances that are constructed by using linearβ¦
Protego: securing wireless communication via programmable metasurface
- Computer ScienceMobiCom
- 2022
Protego is presented, which offloads the security protection to a metasurface comprised of a large number of 1-bit programmable unit-cells (i.e., phase shifters) and can generate artificial phase noise to obfuscate the signals towards potential eavesdroppers, while preserving the signal integrity and beamforming gain towards the legitimate receiver.
References
SHOWING 1-10 OF 35 REFERENCES
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization
- Computer ScienceIEEE INFOCOM 2020 - IEEE Conference on Computer Communications
- 2020
Empirical results show that the proposed scheme can suppress Eveβs attack success rate to the level of random guessing, even if she knows all the symbols transmitted through other antenna modes.
Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits
- Computer Science2009 IEEE International Conference on Communications
- 2009
The information theoretic limits of key generation schemes are investigated, based on the level of estimation error, temporal correlation, and dependence of the eavesdropper and legitimate channels.
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization
- Computer ScienceIEEE Transactions on Dependable and Secure Computing
- 2020
A practical channel randomization approach to defend against signal cancellation attack, which exploits state diversity and swift reconfigurability of reconfigurable antenna to increase randomness and meanwhile reduce correlation of channel state information.
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols
- Computer Science, MathematicsESORICS
- 2012
A practical and efficient man-in-the-middle attack against secret keys using physical properties of the wireless channel, which leads to a high key disagreement rate, and a key recovery that reveals up to 47% of the generated secret bits.
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
- Computer ScienceMobiCom '08
- 2008
This paper presents a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space.
Secret Key Generation in the Two-Way Relay Channel With Active Attackers
- Computer ScienceIEEE Transactions on Information Forensics and Security
- 2014
This paper proposes an effective key generation scheme that achieves a substantially larger key rate than that of a direct channel mimic approach, and establishes the maximal attacker's power under which the scheme can still achieve a nonzero key rate.
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
- Computer Science2011 Proceedings IEEE INFOCOM
- 2011
This work presents a new secret key generation approach that utilizes the uniformly distributed phase information of channel responses to extract shared cryptographic keys under narrowband multipath fading models and is highly scalable and can improve the analytical key bit generation rate by a couple of orders of magnitude.
Lockpicking physical layer key exchange: weak adversary models invite the thief
- Computer ScienceWISEC
- 2015
This work utilizes a more realistic multi-antenna eavesdropper and proposes a novel approach that detects artificial interferences, demonstrating the risk unrealistic adversary models pose in current practical physical layer security schemes.
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
- Computer Science, BusinessIEEE Transactions on Antennas and Propagation
- 2005
A new secret key generation and agreement scheme that uses the fluctuation of channel characteristics with an electronically steerable parasitic array radiator (ESPAR) antenna and has the ability to generate secret keys from the received signal strength indicator (RSSI) profile with sufficient independence is proposed.
On passive inference attacks against physical-layer key extraction?
- Computer Science, MathematicsEUROSEC '11
- 2011
An experimental analysis is presented that examines the relationship between the channel measurements used to extract a symmetric key between two devices and those observed by one or more distantly located passive adversaries and finds that there does exist a strong correlation in measurements observed by adversaries located significantly greater than a half-wavelength away from two communicating wireless devices.