A Secrete Key Extraction Using Received Signal Strength (RSS) of Wireless Networks
Keywords:
Secrete Key Extraction, Key generation, Key exchangeAbstract
In this paper, we evaluate the effectiveness of secret key extraction from the Received signal strength (RSS) variations on the wireless channel between the two devices for private communication between them. We use real world measurements of RSS in a variety of environments and settings. The results from our experiments with 802.11-based laptops show that 1)An adversary can cause predictable key generation in these static environments, and 2)In dynamic scenarios where the two devices are mobile, high entropy bits are obtained . Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive Cascade-based information reconciliation and privacy amplification. In our scheme, to provide good scalability in terms of the number of nodes, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that it provides controllable resilience when malicious nodes compromise a limited number of nodes before key revocation and renewal.
References
[1] W.Â
Stallings “Cryptography  andÂ
network security principles andÂ
practice,â€Â Fourth edition, Prentice hall, 2007.
[2] Gope,Â
P., Ghosh, D.,Â
Chelluri, A.R.K. and Chattopadhyay,P., 2009.Â
Multi Operator Delimiter based DataÂ
Encryption Standard (MODDES). ICCNT. Chennai, India, June 27 –
29. 2009.Â
[3] MeikoÂ
Jensen, Jorg Schwenk,Â
Nils Gruschka, Luigi LoÂ
Iacono, “On technicalÂ
security issues in cloud computing†2009, IEEE Computer
Society.
[4] M.Kallahalla,Â
E.Riedel, R.Swaminathan,
Q.Wang, and K.Fu,Â
“Plutus: Scalable SecureÂ
File Sharing on UntrustedÂ
Storage,â€Â Proc.Second USENIX Conf.Â
File and StorageÂ
Technologies (FAST), pp.29-42,2003.Â
[5] C. Wang, Q.Wang, K.Ren, and W.Lou, “Privacy-
Preserving Public AuditingÂ
for Data Storage Security in Cloud Computing,†Proc.
IEEE 29th Int’l Conf. Computer Comm.Â
(INFOCOM), pp.525-533, 2010.Â
[6] C. Dubnicki,Â
L.Gryz, L.Heldt, M.Kaczmarczyk, W.Kilian,P.Strzelczak,J.Szczepkowski,C.Ungurean,
and M.Welnicki, “Hydrastor: A Scalable Secondary Storage,â€Â Proc.Â
Seventh Conf. FileÂ
and Storage Technologies (FAST),
pp.197-210,2009.Â
[7] P.DruschelandÂ
A.Rowstron, “PAST: AÂ
Large- Scale, Persistent Peer-to-Peer Storage Utility,â€Â Proc. EighthÂ
Workshop Hot TopicsÂ
in Operating System (Hot OS VIII), pp.75-80,2001. Â
[8] G.Ateniese, K.Benson,Â
and S.Hohenberger,
“Key-Private Proxy Re-Encryption,â€Â Proc.Â
Topics in Cryptology (CT-RSA), pp.279-294,2009. Â
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.