WINLAB Technical Report Using Public RF Sources to Build Secure Associations between Wireless Devices in Proximity

نویسندگان

  • Suhas Mathur
  • Rob Miller
  • Wade Trappe
  • Narayan Mandayam
  • Alexander Varshavsky
چکیده

Forming new secure associations between wireless devices that meet for the first time and do not share a prior trust relationship is an important but challenging problem. We present ProxiMate, a system that allows wireless devices in proximity to securely pair with one another autonomously by generating a common secret key. ProxiMate works by making wireless devices in proximity tap into a surprisingly ambient source of randomness – namely, the fading wireless channel relative to a public source of airwaves, such as an FM or TV broadcast tower. Shared randomness is available only to the legitimate terminals in physical proximity, but not to a sufficiently distant adversary. ProxiMate enables the generation of a shared secret key, which can be used to communicate confidentially and/or to authenticate each others’ physical proximity. Key generation in ProxiMate is unconditionally secure, and does not require the adversary to be computationally bounded. We evaluate ProxiMate using analytical and experimental methods, using ambient FM and TV signals captured with a software defined radio. ProxiMate can speed up the time needed to generate a common key by monitoring multiple RF sources concurrently. Finally, we consider the case of an active adversary that has arbitrary control over the signal transmitted by the public source itself, and show that with a suitable modification to the system, ProxiMate can still extract a secret key securely.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing

This paper describes a method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wireless connections between two digital devices by putting them in close proximity to each other and pressing the connection button. The devices ”identify” each other by measuring each other’s signal strength. We designed a set...

متن کامل

Talking to Strangers: Authentication in Ad-Hoc Wireless Networks

In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust between strangers. We present a user-friendly solution, which provides secure authentication using almost any established public-key-based key exchange protocol, as well as inexpensive hash-based alternatives. In our approac...

متن کامل

Exposure to Radiofrequency Radiation Emitted from Common Mobile Phone Jammers Alters the Pattern of Muscle Contractions: an Animal Model Study

Introduction: The fast-growing telecommunication and wireless technologies has led to more dependence to these communication devices and higher levels of exposure to electromagnetic radiations propagated by cellular devices and their service towers. To disable signaling in places where silence is valued or where information quarantine measures are required, mobile phone jammers emit radiofreque...

متن کامل

Evidently secure device associations

A key problem in mobile and ubiquitous computing is that of setting up an association between a pair of devices so that they may communicate securely over a wireless network. It is particularly important to be able to solve this problem for spontaneous associations, which must not depend on preexisting security values such as certificates, and when the only means of identifying the target devic...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010