CLIMEX: A Wireless Physical Layer Security Protocol Based on Clocked Impulse Exchanges

A novel method and protocol establishing common secrecy based on physical parameters between two users is proposed. The four physical parameters of users are their clock frequencies, their relative clock phases and the distance between them. The protocol proposed between two users is backed by theoretical model for the measurements. Further, estimators are proposed to estimate secret physical parameters. Physically exchanged parameters are shown to be secure by virtue of their non-observability to adversaries. Under a simplified analysis based on a testbed settings, it is shown that 38 bits of common secrecy can be derived for one run of the proposed protocol among users. The method proposed is also robust against various kinds of active timing attacks and active impersonating adversaries.

[1]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[2]  Panagiotis Papadimitratos,et al.  Pairwise Secret Key Agreement based on Location-derived Common Randomness , 2015, ArXiv.

[3]  Mudhakar Srivatsa,et al.  Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.

[4]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[5]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[6]  Peng Ning,et al.  Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[7]  Srdjan Capkun,et al.  UWB rapid-bit-exchange system for distance bounding , 2015, WISEC.

[8]  Henk Wymeersch,et al.  Traffic Coordination at Road Intersections: Autonomous Decision-Making Algorithms Using Model-Based Heuristics , 2017, IEEE Intelligent Transportation Systems Magazine.

[9]  Christina Fragouli,et al.  A mobile world of security - The model , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[10]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[11]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[12]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[13]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[14]  Srdjan Capkun,et al.  Realization of RF Distance Bounding , 2010, USENIX Security Symposium.

[15]  Panagiotis Papadimitratos,et al.  Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.

[16]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[17]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[18]  Pramod K. Varshney,et al.  Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.

[19]  Walid Saad,et al.  Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.

[20]  Alessio De Angelis,et al.  Cooperative Decentralized Localization Using Scheduled Wireless Transmissions , 2013, IEEE Communications Letters.

[21]  Sneha Kumar Kasera,et al.  On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.

[22]  James Gross,et al.  PHY layer authentication via drifting oscillators , 2014, 2014 IEEE Global Communications Conference.

[23]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[24]  Michael A. Jensen,et al.  Improved Radiometric Identification of Wireless Devices Using MIMO Transmission , 2011, IEEE Transactions on Information Forensics and Security.

[25]  Sae Woo Nam,et al.  Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.

[26]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[27]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[28]  Alessio De Angelis,et al.  Joint Ranging and Clock Parameter Estimation by Wireless Round Trip Time Measurements , 2015, IEEE Journal on Selected Areas in Communications.

[29]  Xianbin Wang,et al.  Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.

[30]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[31]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[32]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[33]  Petre Stoica,et al.  Scalable and Passive Wireless Network Clock Synchronization in LOS Environments , 2017, IEEE Transactions on Wireless Communications.

[34]  G. Gaderer,et al.  Traps and pitfalls in secure clock synchronization , 2007, 2007 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication.

[35]  Panganamala Ramana Kumar,et al.  Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks , 2009, IEEE INFOCOM 2009.

[36]  Srdjan Capkun,et al.  Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.

[37]  Alessio De Angelis,et al.  Characterization of a Flexible UWB Sensor for Indoor Localization , 2013, IEEE Transactions on Instrumentation and Measurement.

[38]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[39]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[40]  Akbar Rahman,et al.  Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[41]  Aydin Sezgin,et al.  Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.

[42]  Panagiotis Papadimitratos,et al.  Securing Vehicular Communications - Assumptions, Requirements, and Principles , 2006 .

[43]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[44]  Deog-Kyoon Jeong,et al.  Practical considerations in the design and implementation of time synchronization systems using IEEE 1588 , 2009, IEEE Communications Magazine.