ABSTRACT
Wireless key generation is promising in establishing a pair of secret keys for ubiquitous Wi-Fi networks. However, existing Wi-Fi-based key generation systems are not always applicable in dynamic mobile wireless environments because they are completed on static personal computers. To fill this gap, this paper proposes a novel key generation system for dynamic mobile devices, named MobileKey. We conduct extensive experiments and analysis to explore the feasibility of wireless key generation for mobile devices. Furthermore, we propose a fast and robust key generation scheme suitable for mobile devices. Evaluation in real-world environments shows that our system can achieve up to 5000 bit/s key generation rate and 99.1% key matching rate. Compared with state-of-the-art systems, MobileKey improves the key generation rate by 25 ×.
- Syed Taha Ali, Vijay Sivaraman, and Diethelm Ostry. 2013. Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Transactions on Mobile Computing 13, 12 (2013), 2763–2776.Google ScholarCross Ref
- Christian Cachin and Ueli M Maurer. 1997. Linking information reconciliation and privacy amplification. Journal of Cryptology 10, 2 (1997), 97–110.Google ScholarDigital Library
- David L Donoho. 2006. Compressed sensing. IEEE Transactions on Information Theory (2006).Google Scholar
- Jiayao Gao, Weitao Xu, Salil Kanhere, Sanjay Jha, Jun Young Kim, Walter Huang, and Wen Hu. 2021. A novel model-based security scheme for LoRa key generation. In Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021). 47–61.Google ScholarDigital Library
- Xinrui Ge, Jia Yu, Hanlin Zhang, Chengyu Hu, Zengpeng Li, Zhan Qin, and Rong Hao. 2019. Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and Secure computing 18, 1 (2019), 490–504.Google ScholarDigital Library
- Francesco Gringoli, Matthias Schulz, Jakob Link, and Matthias Hollick. 2019. Free your CSI: A channel state information extraction platform for modern Wi-Fi chipsets. In Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization. 21–28.Google ScholarDigital Library
- Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 836–852.Google ScholarCross Ref
- Amer A Hassan, Wayne E Stark, John E Hershey, and Sandeep Chennakeshu. 1996. Cryptographic key agreement for mobile radio. Digital Signal Processing 6, 4 (1996), 207–212.Google ScholarCross Ref
- Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K Kasera, Neal Patwari, and Srikanth V Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on Mobile computing and networking. 321–332.Google ScholarDigital Library
- Jun Young Kim, Ralph Holz, Wen Hu, and Sanjay Jha. 2017. Automated analysis of secure internet of things protocols. In Proceedings of the 33rd Annual Computer Security Applications Conference. 238–249.Google ScholarDigital Library
- Qi Lin, Weitao Xu, Jun Liu, Abdelwahed Khamis, Wen Hu, Mahbub Hassan, and Aruna Seneviratne. 2019. H2B: Heartbeat-based secret key generation using piezo vibration sensors. In Proceedings of the 18th International Conference on Information Processing in Sensor Networks. 265–276.Google ScholarDigital Library
- Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In 2013 Proceedings IEEE INFOCOM. IEEE, 3048–3056.Google ScholarCross Ref
- Hongbo Liu, Jie Yang, Yan Wang, and Yingying Chen. 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In 2012 Proceedings IEEE Infocom. IEEE, 927–935.Google Scholar
- Suhas Mathur, Robert Miller, Alexander Varshavsky, Wade Trappe, and Narayan Mandayam. 2011. Proximate: proximity-based secure pairing using ambient wireless signals. In Proceedings of the 9th international conference on Mobile systems, applications, and services. 211–224.Google ScholarDigital Library
- Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. 2008. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking. 128–139.Google ScholarDigital Library
- Ueli M Maurer. 1993. Secret key agreement by public discussion from common information. IEEE transactions on information theory 39, 3 (1993), 733–742.Google ScholarDigital Library
- Girish Revadigar, Chitra Javali, Wen Hu, and Sanjay Jha. 2015. DLINK: Dual link based radio frequency fingerprinting for wearable devices. (2015), 329–337.Google Scholar
- Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, and Elaine Barker. 2001. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical Report. Booz-allen and hamilton inc mclean va.Google Scholar
- Matthias Schulz, Jakob Link, Francesco Gringoli, and Matthias Hollick. 2018. Shadow Wi-Fi: Teaching smartphones to transmit raw signals and to extract channel state information to implement practical covert channels over Wi-Fi. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services. 256–268.Google ScholarDigital Library
- Kyung-Ah Shim. 2015. A survey of public-key cryptographic primitives in wireless sensor networks. IEEE Communications Surveys and Tutorials (2015).Google Scholar
- Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, and Jizhong Zhao. 2016. Instant and robust authentication and key agreement among mobile devices. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 616–627.Google ScholarDigital Library
- Weitao Xu, Sanjay Jha, and Wen Hu. 2018. LoRa-key: Secure key generation system for LoRa-based network. IEEE Internet of Things Journal 6, 4 (2018), 6404–6416.Google ScholarCross Ref
- Weitao Xu, Junqing Zhang, Shunqi Huang, Chengwen Luo, and Wei Li. 2021. Key Generation for Internet of Things: A Contemporary Survey. ACM Computing Surveys (CSUR) 54, 1 (2021), 1–37.Google ScholarDigital Library
- Kai Zeng, Daniel Wu, An Chan, and Prasant Mohapatra. 2010. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. (2010), 1–9.Google Scholar
Index Terms
- MobileKey: A Fast and Robust Key Generation System for Mobile Devices
Recommendations
InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices
IPSN '21: Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021)Secure Device-to-Device (D2D) communication is becoming increasingly important with the ever-growing number of Internet-of-Things (IoT) devices in our daily life. To achieve secure D2D communication, the key agreement between different IoT devices ...
Inaudible acoustic signal based key agreement system for IoT devices: poster abstract
SenSys '20: Proceedings of the 18th Conference on Embedded Networked Sensor SystemsSecure Device-to-Device (D2D) communication is becoming increasingly important with the ever-growing number of Internet-of-Things (IoT) devices in our daily life. To achieve secure D2D communication, the key agreement between different IoT devices ...
Key Generation for Internet of Things: A Contemporary Survey
Key generation is a promising technique to bootstrap secure communications for the Internet of Things devices that have no prior knowledge between each other. In the past few years, a variety of key generation protocols and systems have been proposed. ...
Comments