Statistical inference attack against PHY-layer key extraction and countermeasures

نویسندگان

چکیده

The establishment of secure secret keys ahead transmissions is one the key issues in field information security. security traditional cryptographic mechanisms seriously challenged by computing-intensive attacks, with fast growth high-performance computing. As an alternative, considerable efforts have been made to develop physical (PHY) layer measures recent years, such as link-signature-based (LSB) extraction techniques. Those believed secure, based on fundamental assumption that wireless signals received at two locations are uncorrelated when separated more than half a wavelength. However, this does not hold some circumstances under latest observations, rendering LSB vulnerable attacks. To address problem, formal theoretical analysis channel correlations both real indoor and outdoor environments provided paper. Moreover, paper proposes empirical statistical inference attacks (SIA) against extraction, whereby adversary infers signature target link. Consequently, extracted from has recovered observing surrounding links. In contrast prior literature assumes link-correlation models for inference, our study make any link correlation. Instead, we employ machine learning (ML) methods empirically measured signatures. We further propose countermeasure SIAs, called forward-backward cooperative protocol helpers (FBCH). FBCH, (other trusted nodes) introduced provide randomness extraction. Our experimental results shown proposed still quite effective even without making assumptions Furthermore, effectiveness FBCH validated experiment results.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Countermeasures against Timing Attack in RSA Algorithm

Public key cryptography is based on two keys, in which decryption key is private key. Among the different cryptanalytic attacks, timing attack is one of the possible attacks on RSA that determines bits of private key. This is done by determining time for each iteration in computing modular exponentiation. There are different mechanisms to counter such attack. Among them, blinding method and ran...

متن کامل

Secure Message Authentication Against Related-Key Attack

Security against related-key attacks is an important criteria for modern cryptographic constructions. In the related-key setting, the adversary has the ability to query the underlying function on the target key as well as on some related-keys. Although provable security against related-key attack has received considerable attention in recent years, most of the results in the literature aim to a...

متن کامل

Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness

Many hardware countermeasures against differential power analysis (DPA) attacks have been developed during the last years. Designers of cryptographic devices using such countermeasures to protect their devices have the challenging task to select and implement a suitable combination of countermeasures. Every device has different requirements, and so there is no universal solution to protect devi...

متن کامل

Audio-Replay Attack Detection Countermeasures

This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017. In this study we focused on comparison of different spoofing detection approaches. These were GMM based methods, high level features extraction with simple classifier and deep learning frameworks. Experiments performed on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Networks

سال: 2021

ISSN: ['1572-8196', '1022-0038']

DOI: https://doi.org/10.1007/s11276-021-02769-x