An Adaptive Physical Layer Key Extraction Scheme for Smart Homes

被引:11
作者
Zhao, Hong [1 ]
Zhang, Yuexin [2 ,3 ]
Huang, Xinyi [1 ]
Xiang, Yang [2 ,3 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic, Australia
来源
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) | 2019年
基金
中国国家自然科学基金;
关键词
self-adaptive lossless quantization; key generation; physical layer; smart home devices;
D O I
10.1109/TrustCom/BigDataSE.2019.00073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wireless transmission of home area networks contributes to the vulnerabilities of smart homes. As a result, smart homes are vulnerable to malicious attacks like eavesdropping. To secure the transmissions, secret keys should be established for smart home devices. In practical smart home applications, smart home devices might be resource-constrained devices. Thus, the lightweight key establishment schemes are preferred. Typically, lightweight physical layer key extraction schemes can be employed by the smart home devices. However, the key generation rate of the schemes is low. To improve the key generation rate, in this paper we propose an adaptive physical layer key extraction scheme for smart homes by making use of the Received Signal Strength (RSS). Specifically, in our scheme, two smart home devices collect the RSS measurements by probing with each other. Then, the collected measurements are quantized by running the proposed Self-adaptive Lossless Quantization algorithm. Completing these operations, the two smart home devices can obtain the secret key. In our scheme, we design the self-adaptive lossless quantization algorithm to improve the key generation rate. To show the practicality of the new scheme, we implement it using the Ralink WiFi cards. Additionally, we analyse the performance of our scheme and compare it with that of other related works.
引用
收藏
页码:499 / 506
页数:8
相关论文
共 29 条
  • [11] Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments
    Kumar, Pardeep
    Gurtov, Andrei
    Iinatti, Jari
    Ylianttila, Mika
    Sain, Mangal
    [J]. IEEE SENSORS JOURNAL, 2016, 16 (01) : 254 - 264
  • [12] Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud
    Li, Jiangtao
    Zhang, Lei
    Liu, Joseph K.
    Qian, Haifeng
    Dong, Zheming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2572 - 2583
  • [13] Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks
    Li, Xinghua
    Liu, Jiajia
    Yao, Qingsong
    Ma, Jianfeng
    [J]. IEEE ACCESS, 2017, 5 : 5281 - 5291
  • [14] Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices
    Li, Zi
    Pei, Qingqi
    Markwood, Ian
    Liu, Yao
    Zhu, Haojin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 802 - 817
  • [15] Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness
    Liu, Yanpei
    Draper, Stark C.
    Sayeed, Akbar M.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) : 1484 - 1497
  • [16] Margelis G., 2017, 2017 IEEE INT C COMM, P1, DOI DOI 10.1109/ICC.2017.7997419
  • [17] Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel
    Mathur, Suhas
    Trappe, Wade
    Mandayam, Narayan
    Ye, Chunxuan
    Reznik, Alex
    [J]. MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, : 128 - +
  • [18] On Statistical Tests for Randomness Included in the NIST SP800-22 Test Suite and Based on the Binomial Distribution
    Pareschi, Fabio
    Rovatti, Riccardo
    Setti, Gianluca
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 491 - 505
  • [19] High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
    Patwari, Neal
    Croft, Jessica
    Jana, Suman
    Kasera, Sneha Kumar
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (01) : 17 - 30
  • [20] Secret Key Extraction from Wireless Signal Strength in Real Environments
    Premnath, Sriram Nandha
    Jana, Suman
    Croft, Jessica
    Gowda, Prarthana Lakshmane
    Clark, Mike
    Kasera, Sneha Kumar
    Patwari, Neal
    Krishnamurthy, Srikanth V.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) : 917 - 930