Abstract
Wireless key exchange on the physical layer is a key exchange protocol independent of computational assumptions. It relies only on the physical properties of the wireless channels to generate a common secret key between two parties. Precise conditions, however, for such a key exchange to be secure remain unclear. An argument why unconditional security does not hold for general scenarios is provided. Finally, a novel side-channel attack against such key exchange schemes is described and experimentally validated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aono, T., Higuchi, K., Taromaru, M., Ohira, T., Komiyama, B., Sasaoka, H.: Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation, 3776–3784 (November 2005)
Frankonia antennas, http://www.frankonia-emv.com/data_sheets/emc_test_equipment/for_emission_measurements/Antennas_BTA.pdf
Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust key generation from signal envelopes in wireless networks. In: ACM conference on Computer and Communications Security, pp. 401–410 (October 2007)
Balanis, C.A.: Antenna Theory: analysis and design. John Wiley and Sons, Chichester (1997)
Bloch, M., Barros, J., Rodrigues, M.R.D., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Transactions on Information Theory 54(6), 2515–2534 (2008)
Blahut, R.E.: Digital Transmission of Information. Addison-Wesley, Reading (1990)
Frankonia emc test-systems, http://www.frankonia-emv.com/
Goel, S., Negi, R.: Secret communication in presence of colluding eavesdroppers. In: Proc. IEEE Military Communication (MILCOM), vol. 3, pp. 1501–1506 (October 2005)
Hershey, J.E., Hassan, A.A., Yarlagadda, R.: Unconventional cryptographic keying variable management. IEEE Transactions on Communications 43, 3–6 (1995)
Hashimoto, T., Itoh, T., Ueba, M., Iwai, H., Sasaoka, H., Kobara, K., Imai, H.: Comparative studies in key disagreement correction process on wireless key agreement system. In: Information Security Applications, pp. 173–187 (January 2008)
Hassan, A.A., Stark, W.E., Hershey, J.E., Chennakeshu, S.: Cryptographic key agreement for mobile radio. Digital Signal Processing 6, 207–212 (1996)
Proakis, J.G.: Communication Systems Engineering, ch. 7.6. Prentice Hall, Englewood Cliffs (2002)
Jørgensen, M., Yanakiev, B., Kirkelund, G., Popovski, P., Yomo, H., Larsen, T.: Shout to secure: Physical-layer wireless security with known interference. In: Global Telecommunications Conference, GLOBECOM 2007, pp. 33–38. IEEE, Los Alamitos (November 2007)
Koorapaty, H., Hassan, A.A., Chennakeshu, S.: Secure information transmission for mobile radio. IEEE Communication Letters 4, 52–55 (2000)
Kim, H., Villasenor, J.D.: Secure MIMO communications in a system with equal number of transmit and receive antennas. IEEE Communication Letters 12, 386–388 (2008)
Li, X., Hwu, J., Paul Ratazzi, E.: Array redundancy and diversity for wireless transmissions with low probability of interception. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP Proceedings, vol. 4, pp. 525–528 (May 2006)
Li, Z., Xu, W., Miller, R., Trappe, W.: Securing wireless systems via lower layer enforcements. In: Proceedings of the 5th ACM Workshop on Wireless Security, pp. 33–42 (2006)
Leung-Yan-Cheong, S.K., Hellman, M.E.: The gaussian wiretap channel. IEEE Trans. Inform. Theory 24, 451–456 (1978)
Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 39(3), 733–742 (1993)
Mathur, S., Trappe, W., Mandayam, N.B., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Garcia-Luna-Aceves, J.J., Sivakumar, R., Steenkiste, P. (eds.) MOBICOM, pp. 128–139. ACM, New York (2008)
Ohira, T.: Secret key generation exploiting antenna beam steering and wave propagation reciprocity. In: European Microwave Conference , vol. 1 (October 2005)
Okumura, Y., Ohmori, E., Kawano, T., Fukuda, K.: Field strength and its variability in vhf and uhf land mobile radio services (1968)
Sun, C., Hirata, A., Ohira, T., Karmakar, N.C.: Fast beamforming of electronically steerable parasitic array radiator antennas: Theory and experiment. IEEE Transactions on Antennas and Propagation, 1819–1832 (July 2004)
Tope, M.A., McEachen, J.C.: Unconditionally secure communications over fading channels. In: Military Communications Conference, Communications for Network-Centric Operations: Creating the Information Force, MILCOM 2001, vol. 1, pp. 54–58 (2001)
Tse, D., Viswanath, P.: Fundamentals of Wireless Communication. Cambridge University Press, Cambridge (2005)
Tekin, E., Yener, A.: The gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming. In: Information Theory and Applications Workshop, pp. 404–413 (February 2007)
Ettus research, http://www.ettus.com/
Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355–1387 (1975)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing, pp. 46–57 (2005)
Ye, C., Mathur, S., Reznik, A., Shah, Y., Trappe, W., Mandayam, N.B.: Information-theoretically secret key generation for fading wireless channels. CoRR, abs/0910.502 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Döttling, N., Lazich, D., Müller-Quade, J., de Almeida, A.S. (2011). Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity. In: Chung, Y., Yung, M. (eds) Information Security Applications. WISA 2010. Lecture Notes in Computer Science, vol 6513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17955-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-17955-6_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17954-9
Online ISBN: 978-3-642-17955-6
eBook Packages: Computer ScienceComputer Science (R0)