Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization

@article{Pan2021ManintheMiddleAR,
  title={Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization},
  author={Yanjun Pan and Ziqi Xu and Ming Li and Loukas Lazos},
  journal={Proceedings of the Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing},
  year={2021}
}
  • Yanjun PanZiqi Xu Loukas Lazos
  • Published 4 June 2021
  • Computer Science
  • Proceedings of the Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
Physical-layer based key generation schemes exploit the channel reciprocity for secret key extraction, which can achieve information-theoretic secrecy against eavesdroppers. Such methods, although practical, have been shown to be vulnerable against man-in-the-middle (MitM) attacks, where an active adversary, Mallory, can influence and infer part of the secret key generated between Alice and Bob by injecting her own packet upon observing highly correlated channel/RSS measurements from Alice and… 

Adversarial Reconfigurable Intelligent Surface Against Physical Layer Key Generation

This work shows an Eve-controlled adversarial RIS (Eve-RIS), by inserting into the legitimate channel a random and reciprocal channel, can partially reconstruct the secret keys from the legitimate PL-SKG process.

Star-specific Key-homomorphic PRFs from Linear Regression and Extremal Set Theory

We introduce a novel method to derandomize the learning with errors (LWE) problem by generating deterministic yet sufficiently independent LWE instances that are constructed by using linear…

Protego: securing wireless communication via programmable metasurface

Protego is presented, which offloads the security protection to a metasurface comprised of a large number of 1-bit programmable unit-cells (i.e., phase shifters) and can generate artificial phase noise to obfuscate the signals towards potential eavesdroppers, while preserving the signal integrity and beamforming gain towards the legitimate receiver.

Protego

References

SHOWING 1-10 OF 35 REFERENCES

ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization

Empirical results show that the proposed scheme can suppress Eve’s attack success rate to the level of random guessing, even if she knows all the symbols transmitted through other antenna modes.

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

  • J. Wallace
  • Computer Science
    2009 IEEE International Conference on Communications
  • 2009
The information theoretic limits of key generation schemes are investigated, based on the level of estimation error, temporal correlation, and dependence of the eavesdropper and legitimate channels.

Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization

A practical channel randomization approach to defend against signal cancellation attack, which exploits state diversity and swift reconfigurability of reconfigurable antenna to increase randomness and meanwhile reduce correlation of channel state information.

A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols

A practical and efficient man-in-the-middle attack against secret keys using physical properties of the wireless channel, which leads to a high key disagreement rate, and a key recovery that reveals up to 47% of the generated secret bits.

Radio-telepathy: extracting a secret key from an unauthenticated wireless channel

This paper presents a protocol that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space.

Secret Key Generation in the Two-Way Relay Channel With Active Attackers

This paper proposes an effective key generation scheme that achieves a substantially larger key rate than that of a direct channel mimic approach, and establishes the maximal attacker's power under which the scheme can still achieve a nonzero key rate.

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks

This work presents a new secret key generation approach that utilizes the uniformly distributed phase information of channel responses to extract shared cryptographic keys under narrowband multipath fading models and is highly scalable and can improve the analytical key bit generation rate by a couple of orders of magnitude.

Lockpicking physical layer key exchange: weak adversary models invite the thief

This work utilizes a more realistic multi-antenna eavesdropper and proposes a novel approach that detects artificial interferences, demonstrating the risk unrealistic adversary models pose in current practical physical layer security schemes.

Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels

A new secret key generation and agreement scheme that uses the fluctuation of channel characteristics with an electronically steerable parasitic array radiator (ESPAR) antenna and has the ability to generate secret keys from the received signal strength indicator (RSSI) profile with sufficient independence is proposed.

On passive inference attacks against physical-layer key extraction?

An experimental analysis is presented that examines the relationship between the channel measurements used to extract a symmetric key between two devices and those observed by one or more distantly located passive adversaries and finds that there does exist a strong correlation in measurements observed by adversaries located significantly greater than a half-wavelength away from two communicating wireless devices.