A Secrete Key Extraction Using Received Signal Strength (RSS) of Wireless Networks

Authors(3) :-Solai Rajan T, Udaya Kumar D J, Anima Mahato

In this paper, we evaluate the effectiveness of secret key extraction from the Received signal strength (RSS) variations on the wireless channel between the two devices for private communication between them. We use real world measurements of RSS in a variety of environments and settings. The results from our experiments with 802.11-based laptops show that 1)An adversary can cause predictable key generation in these static environments, and 2)In dynamic scenarios where the two devices are mobile, high entropy bits are obtained . Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive Cascade-based information reconciliation and privacy amplification. In our scheme, to provide good scalability in terms of the number of nodes, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that it provides controllable resilience when malicious nodes compromise a limited number of nodes before key revocation and renewal.

Authors and Affiliations

Solai Rajan T
Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India
Udaya Kumar D J
Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India
Anima Mahato
Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India

Secrete Key Extraction, Key generation, Key exchange

[1] W.  Stallings  “Cryptography  and  network security  principles  and  practice,”  Fourth  edition, Prentice hall, 2007.

[2] Gope,  P.,  Ghosh,  D.,  Chelluri,  A.R.K.  and Chattopadhyay,P.,  2009.  Multi  Operator  Delimiter based  Data  Encryption  Standard  (MODDES). ICCNT. Chennai, India, June 27 – 29. 2009. 

[3] Meiko  Jensen,  Jorg  Schwenk,  Nils  Gruschka, Luigi  Lo  Iacono,  “On  technical  security  issues  in cloud computing” 2009, IEEE Computer Society.

[4] M.Kallahalla,  E.Riedel,  R.Swaminathan, Q.Wang,  and  K.Fu,  “Plutus:  Scalable  Secure  File Sharing  on  Untrusted  Storage,”  Proc.Second USENIX  Conf.  File  and  Storage  Technologies (FAST), pp.29-42,2003. 

[5] C. Wang, Q.Wang, K.Ren, and W.Lou, “Privacy- Preserving  Public  Auditing  for  Data  Storage Security in Cloud Computing,” Proc. IEEE 29th Int’l Conf.  Computer  Comm.  (INFOCOM),  pp.525-533, 2010. 

[6] C. Dubnicki,  L.Gryz,  L.Heldt,  M.Kaczmarczyk, W.Kilian,P.Strzelczak,J.Szczepkowski,C.Ungurean, and M.Welnicki, “Hydrastor: A Scalable Secondary Storage,”  Proc.  Seventh  Conf.  File  and  Storage Technologies (FAST), pp.197-210,2009. 

[7] P.Druscheland  A.Rowstron,  “PAST:  A  Large- Scale, Persistent Peer-to-Peer Storage Utility,”  Proc. Eighth  Workshop  Hot  Topics  in  Operating  System (Hot OS VIII), pp.75-80,2001.  

[8] G.Ateniese,  K.Benson,  and  S.Hohenberger, “Key-Private  Proxy  Re-Encryption,”  Proc.  Topics in Cryptology (CT-RSA), pp.279-294,2009.  

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 242-245
Manuscript Number : IJSRSET152233
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Solai Rajan T, Udaya Kumar D J, Anima Mahato, " A Secrete Key Extraction Using Received Signal Strength (RSS) of Wireless Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.242-245, March-April-2015. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET152233

Article Preview