An Adaptive Physical Layer Key Extraction Scheme for Smart Homes

被引:11
作者
Zhao, Hong [1 ]
Zhang, Yuexin [2 ,3 ]
Huang, Xinyi [1 ]
Xiang, Yang [2 ,3 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
来源
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) | 2019年
基金
中国国家自然科学基金;
关键词
self-adaptive lossless quantization; key generation; physical layer; smart home devices;
D O I
10.1109/TrustCom/BigDataSE.2019.00073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wireless transmission of home area networks contributes to the vulnerabilities of smart homes. As a result, smart homes are vulnerable to malicious attacks like eavesdropping. To secure the transmissions, secret keys should be established for smart home devices. In practical smart home applications, smart home devices might be resource-constrained devices. Thus, the lightweight key establishment schemes are preferred. Typically, lightweight physical layer key extraction schemes can be employed by the smart home devices. However, the key generation rate of the schemes is low. To improve the key generation rate, in this paper we propose an adaptive physical layer key extraction scheme for smart homes by making use of the Received Signal Strength (RSS). Specifically, in our scheme, two smart home devices collect the RSS measurements by probing with each other. Then, the collected measurements are quantized by running the proposed Self-adaptive Lossless Quantization algorithm. Completing these operations, the two smart home devices can obtain the secret key. In our scheme, we design the self-adaptive lossless quantization algorithm to improve the key generation rate. To show the practicality of the new scheme, we implement it using the Ralink WiFi cards. Additionally, we analyse the performance of our scheme and compare it with that of other related works.
引用
收藏
页码:499 / 506
页数:8
相关论文
共 29 条
  • [1] A Secret Key Extraction Technique Applied in Vehicular Networks
    Abdelgader, Abdeldime M. S.
    Wu, Lenan
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1396 - 1403
  • [2] [Anonymous], 2011, P 6 ACM S INFORM COM
  • [3] Badawy A., 2015, 2015 IEEE 81 VEH TEC, P1
  • [4] Brassard G., 1994, WORKSH THEOR APPL CR, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-735, DOI 10.1007/3-540-48285-735]
  • [5] Chu C.-K., 2010, ACM Symposium on Information, Computer and Communications Security, ASIA CCS, P337
  • [6] Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices
    Cui, Hui
    Deng, Robert H.
    Liu, Joseph K.
    Yi, Xun
    Li, Yingjiu
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3724 - 3732
  • [7] Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels
    Haroun, Mohamed F.
    Gulliver, T. Aaron
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1764 - 1775
  • [8] Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation
    Hong, Y. -W. Peter
    Huang, Lin-Ming
    Li, Hou-Tung
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1170 - 1181
  • [9] On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments
    Jana, Suman
    Premnath, Sriram Nandha
    Clark, Mike
    Kasera, Sneha K.
    Patwari, Neal
    Krishnamurthy, Srikanth V.
    [J]. FIFTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM 2009), 2009, : 321 - 332
  • [10] Secure information transmission for mobile radio
    Koorapaty, H
    Hassan, AA
    Chennakeshu, S
    [J]. IEEE COMMUNICATIONS LETTERS, 2000, 4 (02) : 52 - 55