A Secrete Key Extraction Using Received Signal Strength (RSS) of Wireless Networks

Authors

  • Solai Rajan T  Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India
  • Udaya Kumar D J  Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India
  • Anima Mahato  Information Technology, Dhanalakshmi College of Engineering, Chennai, Tamil Nadu, India

Keywords:

Secrete Key Extraction, Key generation, Key exchange

Abstract

In this paper, we evaluate the effectiveness of secret key extraction from the Received signal strength (RSS) variations on the wireless channel between the two devices for private communication between them. We use real world measurements of RSS in a variety of environments and settings. The results from our experiments with 802.11-based laptops show that 1)An adversary can cause predictable key generation in these static environments, and 2)In dynamic scenarios where the two devices are mobile, high entropy bits are obtained . Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive Cascade-based information reconciliation and privacy amplification. In our scheme, to provide good scalability in terms of the number of nodes, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that it provides controllable resilience when malicious nodes compromise a limited number of nodes before key revocation and renewal.

References

[1] W.  Stallings  “Cryptography  and  network security  principles  and  practice,”  Fourth  edition, Prentice hall, 2007.

[2] Gope,  P.,  Ghosh,  D.,  Chelluri,  A.R.K.  and Chattopadhyay,P.,  2009.  Multi  Operator  Delimiter based  Data  Encryption  Standard  (MODDES). ICCNT. Chennai, India, June 27 – 29. 2009. 

[3] Meiko  Jensen,  Jorg  Schwenk,  Nils  Gruschka, Luigi  Lo  Iacono,  “On  technical  security  issues  in cloud computing” 2009, IEEE Computer Society.

[4] M.Kallahalla,  E.Riedel,  R.Swaminathan, Q.Wang,  and  K.Fu,  “Plutus:  Scalable  Secure  File Sharing  on  Untrusted  Storage,”  Proc.Second USENIX  Conf.  File  and  Storage  Technologies (FAST), pp.29-42,2003. 

[5] C. Wang, Q.Wang, K.Ren, and W.Lou, “Privacy- Preserving  Public  Auditing  for  Data  Storage Security in Cloud Computing,” Proc. IEEE 29th Int’l Conf.  Computer  Comm.  (INFOCOM),  pp.525-533, 2010. 

[6] C. Dubnicki,  L.Gryz,  L.Heldt,  M.Kaczmarczyk, W.Kilian,P.Strzelczak,J.Szczepkowski,C.Ungurean, and M.Welnicki, “Hydrastor: A Scalable Secondary Storage,”  Proc.  Seventh  Conf.  File  and  Storage Technologies (FAST), pp.197-210,2009. 

[7] P.Druscheland  A.Rowstron,  “PAST:  A  Large- Scale, Persistent Peer-to-Peer Storage Utility,”  Proc. Eighth  Workshop  Hot  Topics  in  Operating  System (Hot OS VIII), pp.75-80,2001.  

[8] G.Ateniese,  K.Benson,  and  S.Hohenberger, “Key-Private  Proxy  Re-Encryption,”  Proc.  Topics in Cryptology (CT-RSA), pp.279-294,2009.  

Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
Solai Rajan T, Udaya Kumar D J, Anima Mahato, " A Secrete Key Extraction Using Received Signal Strength (RSS) of Wireless Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.242-245, March-April-2015.