KaFHCa: Key-establishment via Frequency Hopping Collisions

The massive deployment of IoT devices being utilized by home automation, industrial and military scenarios demands for high security and privacy standards to be achieved through innovative solutions. This paper proposes KaFHCa, a crypto-less protocol that generates shared secret keys by combining random frequency hopping collisions and source indistinguishability independently of the radio channel status. While other solutions tie the secret bit rate generation to the current radio channel conditions, thus becoming unpractical in static environments, KaFHCa guarantees almost the same secret bitrate independently of the channel conditions. KaFHCa generates shared secrets through random collisions of the transmitter and the receiver in the radio spectrum, and leverages on the fading phenomena to achieve source indistinguishability, thus preventing unauthorized eavesdroppers from inferring the key. The proposed solution is (almost) independent of the adversary position, works under the conservative assumption of channel fading ({\sigma} = 8dB), and is capable of generating a secret key of 128 bits with less than 564 transmissions.

[1]  Claude Castelluccia,et al.  Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.

[2]  Bowen Alpern,et al.  Key Exchange Using 'Keyless Cryptography' , 1983, Inf. Process. Lett..

[3]  Giuseppe Piro,et al.  EXCHANge: Securing IoT via channel anonymity , 2019, Comput. Commun..

[4]  Moti Yung A Secure and Useful 'Keyless Cryptosystem' , 1985, Inf. Process. Lett..

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Ivan Martinovic,et al.  Secret keys from entangled sensor motes: implementation and analysis , 2010, WiSec '10.

[7]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[8]  Roberto Di Pietro,et al.  ESC: An efficient, scalable, and crypto-less solution to secure wireless networks , 2015, Comput. Networks.

[9]  Roberto Di Pietro,et al.  COKE Crypto-Less Over-the-Air Key Establishment , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Jian Shen,et al.  An over-the-air key establishment protocol using keyless cryptography , 2018, Future Gener. Comput. Syst..

[11]  Roberto Di Pietro,et al.  Strength of Crowd (SOC)—Defeating a Reactive Jammer in IoT with Decoy Messages , 2018, Sensors.

[12]  Ivan Martinovic,et al.  A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.

[13]  Theodore S. Rappaport,et al.  Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.