An over-the-air key establishment protocol using keyless cryptography

Abstract Today, an increasing number of devices wirelessly communicate with each other. However, due to the nature of wireless transmission, the communications are vulnerable to many adversarial attacks such as eavesdropping. Key establishment is one of the fundamental and widely studied countermeasures for securing the communications. In certain applications, the wireless devices may be energy-constrained, such as sensor nodes. Thus, energy intensive asymmetric key establishment protocols are infeasible. Additionally, in some scenarios, it is not practical to assume that all the devices pre-share certain secrets. Motivated by these observations, this paper presents an over-the-air key establishment protocol using keyless cryptography. Specifically, the proposed protocol is designed without using asymmetric key cryptography and pre-shared secrets. More specifically, our protocol provides a concrete construction to transform the wireless channel into an anonymous channel, and two wireless devices can establish a secret key by directly sending random signals to each other. The performance analysis shows that the energy consumption of our protocol is around 176 times cheaper than that of the Diffie–Hellman key exchange protocol. Additionally, it takes only 159.04 m s to establish a key with 112 secret bits.

[1]  Ross Brewer,et al.  Advanced persistent threats: minimising the damage , 2014, Netw. Secur..

[2]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[3]  Athanasios V. Vasilakos,et al.  Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.

[4]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Sachin Katti,et al.  Full duplex radios , 2013, SIGCOMM.

[7]  Ifip Tc,et al.  Communications and Multimedia Security, 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings , 2010, Communications and Multimedia Security.

[8]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[9]  Moti Yung A Secure and Useful 'Keyless Cryptosystem' , 1985, Inf. Process. Lett..

[10]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[12]  Claude Castelluccia,et al.  Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.

[13]  Mani Mina,et al.  Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[16]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[17]  Roberto Di Pietro,et al.  COKE Crypto-Less Over-the-Air Key Establishment , 2013, IEEE Transactions on Information Forensics and Security.

[18]  Antoine Van de Capelle,et al.  Performance analysis of unslotted CSMA/CA in wireless networks , 2010, Telecommun. Syst..

[19]  Mohamed Mostafa Abd Allah Strengths and Weaknesses of Near Field Communication (NFC) Technology , 2011 .

[20]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[21]  Bowen Alpern,et al.  Key Exchange Using 'Keyless Cryptography' , 1983, Inf. Process. Lett..

[22]  Philip Levis,et al.  Practical, real-time, full duplex wireless , 2011, MobiCom.

[23]  Rong Jin,et al.  Practical Secret Key Agreement for Full-Duplex Near Field Communications , 2014, IEEE Transactions on Mobile Computing.

[24]  Roberto Di Pietro,et al.  ESC: An efficient, scalable, and crypto-less solution to secure wireless networks , 2015, Comput. Networks.

[25]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[26]  Ping Chen,et al.  A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.

[27]  Peng Ning,et al.  Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.

[28]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .

[29]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.