ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi devices Using Physical Layer Security

Secure and scalable device provisioning is a notorious challenge in Wi-Fi. WPA2/WPA3 solutions take user interaction and a strong passphrase for granted. However, the often weak passphrases are subject to guessing attacks. Notably, there has been a significant rise of cyberattacks on Wi-Fi home or small office networks during the COVID-19 pandemic. This paper addresses the device provisioning problem in Wi-Fi (personal mode) and proposes ComPass protocol to supplement WPA2/WPA3. ComPass replaces the pre-installed or user-selected passphrases with automatically generated ones. For this, ComPass employs Physical Layer Security and extracts credentials from common random physical layer parameters between devices. Two major features make ComPass unique and superior compared to previous proposals: First, it employs phase information (rather than amplitude or signal strength) to generate the passphrase so that it is robust, scaleable, and impossible to guess. Our analysis showed that ComPass generated passphrases have 3 times more entropy than human generated passphrases (113-bits vs. 34-bits). Second, ComPass selects parameters such that two devices bind only within a certain proximity (≤ 3m), hence providing practically useful in-build PLS-based authentication. ComPass is available as a kernel module or as full firmware. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

[1]  Xiang-Yang Li,et al.  Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.

[2]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[3]  Mingyan Liu,et al.  PhaseU: Real-time LOS identification with WiFi , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[4]  Gerhard Wunder,et al.  A Novel Key Generating Architecture for Wireless Low-Resource Devices , 2014, 2014 International Workshop on Secure Internet of Things.

[5]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[6]  Shan Chang,et al.  $\pi$ -Splicer: Perceiving Accurate CSI Phases with Commodity WiFi Devices , 2018, IEEE Transactions on Mobile Computing.

[7]  David Wetherall,et al.  Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.

[8]  Robert T. Chien,et al.  Cyclic decoding procedures for Bose- Chaudhuri-Hocquenghem codes , 1964, IEEE Trans. Inf. Theory.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Tony Q. S. Quek,et al.  Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology , 2019, IEEE Transactions on Information Forensics and Security.

[11]  Bhaskar Biswas,et al.  Efficient Root Finding of Polynomials over Fields of Characteristic 2. , 2009 .

[12]  Christof Paar,et al.  Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.

[13]  Matthias Hollick,et al.  Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets , 2019, WiNTECH.

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  Jonathan Kilgallin,et al.  Factoring RSA Keys in the IoT Era , 2019, 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).

[16]  Swarun Kumar,et al.  Decimeter-Level Localization with a Single WiFi Access Point , 2016, NSDI.

[17]  Dwijendra K. Ray-Chaudhuri,et al.  Binary mixture flow with free energy lattice Boltzmann methods , 2022, arXiv.org.

[18]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[19]  Gerhard Wunder,et al.  On time-variant distortions in multicarrier transmission with application to frequency offsets and phase noise , 2005, IEEE Transactions on Communications.

[20]  Daniel Lowe Wheeler zxcvbn: Low-Budget Password Strength Estimation , 2016, USENIX Security Symposium.

[21]  Sachin Katti,et al.  SpotFi: Decimeter Level Localization Using WiFi , 2015, SIGCOMM.

[22]  Frank Piessens,et al.  Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.

[23]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[24]  Tero Kivinen,et al.  More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) , 2003, RFC.

[25]  Mo Li,et al.  Precise Power Delay Profiling with Commodity Wi-Fi , 2015, IEEE Transactions on Mobile Computing.

[26]  Dan Harkins,et al.  Opportunistic Wireless Encryption , 2017, RFC.