WINLAB Technical Report Using Public RF Sources to Build Secure Associations between Wireless Devices in Proximity
نویسندگان
چکیده
Forming new secure associations between wireless devices that meet for the first time and do not share a prior trust relationship is an important but challenging problem. We present ProxiMate, a system that allows wireless devices in proximity to securely pair with one another autonomously by generating a common secret key. ProxiMate works by making wireless devices in proximity tap into a surprisingly ambient source of randomness – namely, the fading wireless channel relative to a public source of airwaves, such as an FM or TV broadcast tower. Shared randomness is available only to the legitimate terminals in physical proximity, but not to a sufficiently distant adversary. ProxiMate enables the generation of a shared secret key, which can be used to communicate confidentially and/or to authenticate each others’ physical proximity. Key generation in ProxiMate is unconditionally secure, and does not require the adversary to be computationally bounded. We evaluate ProxiMate using analytical and experimental methods, using ambient FM and TV signals captured with a software defined radio. ProxiMate can speed up the time needed to generate a common key by monitoring multiple RF sources concurrently. Finally, we consider the case of an active adversary that has arbitrary control over the signal transmitted by the public source itself, and show that with a suitable modification to the system, ProxiMate can still extract a secret key securely.
منابع مشابه
ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing
This paper describes a method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wireless connections between two digital devices by putting them in close proximity to each other and pressing the connection button. The devices ”identify” each other by measuring each other’s signal strength. We designed a set...
متن کاملTalking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust between strangers. We present a user-friendly solution, which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive hash-based alternatives. In our approac...
متن کاملExposure to Radiofrequency Radiation Emitted from Common Mobile Phone Jammers Alters the Pattern of Muscle Contractions: an Animal Model Study
Introduction: The fast-growing telecommunication and wireless technologies has led to more dependence to these communication devices and higher levels of exposure to electromagnetic radiations propagated by cellular devices and their service towers. To disable signaling in places where silence is valued or where information quarantine measures are required, mobile phone jammers emit radiofreque...
متن کاملEvidently secure device associations
A key problem in mobile and ubiquitous computing is that of setting up an association between a pair of devices so that they may communicate securely over a wireless network. It is particularly important to be able to solve this problem for spontaneous associations, which must not depend on preexisting security values such as certificates, and when the only means of identifying the target devic...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کامل