IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET152233                                                     


A Secrete Key Extraction Using Received Signal Strength (RSS) of Wireless Networks

Authors(3):

Solai Rajan T, Udaya Kumar D J, Anima Mahato
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
In this paper, we evaluate the effectiveness of secret key extraction from the Received signal strength (RSS) variations on the wireless channel between the two devices for private communication between them. We use real world measurements of RSS in a variety of environments and settings. The results from our experiments with 802.11-based laptops show that 1)An adversary can cause predictable key generation in these static environments, and 2)In dynamic scenarios where the two devices are mobile, high entropy bits are obtained . Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive Cascade-based information reconciliation and privacy amplification. In our scheme, to provide good scalability in terms of the number of nodes, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that it provides controllable resilience when malicious nodes compromise a limited number of nodes before key revocation and renewal.

Solai Rajan T, Udaya Kumar D J, Anima Mahato

Secrete Key Extraction, Key generation, Key exchange

'

[1] W.  Stallings  “Cryptography  and  network security  principles  and  practice,”  Fourth  edition, Prentice hall, 2007.

[2] Gope,  P.,  Ghosh,  D.,  Chelluri,  A.R.K.  and Chattopadhyay,P.,  2009.  Multi  Operator  Delimiter based  Data  Encryption  Standard  (MODDES). ICCNT. Chennai, India, June 27 – 29. 2009. 

[3] Meiko  Jensen,  Jorg  Schwenk,  Nils  Gruschka, Luigi  Lo  Iacono,  “On  technical  security  issues  in cloud computing” 2009, IEEE Computer Society.

[4] M.Kallahalla,  E.Riedel,  R.Swaminathan, Q.Wang,  and  K.Fu,  “Plutus:  Scalable  Secure  File Sharing  on  Untrusted  Storage,”  Proc.Second USENIX  Conf.  File  and  Storage  Technologies (FAST), pp.29-42,2003. 

[5] C. Wang, Q.Wang, K.Ren, and W.Lou, “Privacy- Preserving  Public  Auditing  for  Data  Storage Security in Cloud Computing,” Proc. IEEE 29th Int’l Conf.  Computer  Comm.  (INFOCOM),  pp.525-533, 2010. 

[6] C. Dubnicki,  L.Gryz,  L.Heldt,  M.Kaczmarczyk, W.Kilian,P.Strzelczak,J.Szczepkowski,C.Ungurean, and M.Welnicki, “Hydrastor: A Scalable Secondary Storage,”  Proc.  Seventh  Conf.  File  and  Storage Technologies (FAST), pp.197-210,2009. 

[7] P.Druscheland  A.Rowstron,  “PAST:  A  Large- Scale, Persistent Peer-to-Peer Storage Utility,”  Proc. Eighth  Workshop  Hot  Topics  in  Operating  System (Hot OS VIII), pp.75-80,2001.  

[8] G.Ateniese,  K.Benson,  and  S.Hohenberger, “Key-Private  Proxy  Re-Encryption,”  Proc.  Topics in Cryptology (CT-RSA), pp.279-294,2009.  

'

Publication Details

Published in : Volume 1 | Issue 2 | March-April - 2015
Date of Publication Print ISSN Online ISSN
2015-04-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
242-245 IJSRSET152233   Technoscience Academy

Cite This Article

Solai Rajan T, Udaya Kumar D J, Anima Mahato, "A Secrete Key Extraction Using Received Signal Strength (RSS) of Wireless Networks", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.242-245, March-April-2015.
URL : http://ijsrset.com/IJSRSET152233.php