Extracting Secret Key from Received Signal Strength (rss) Measurements in Wireless Networks

نویسندگان

  • R. Surya
  • S. V. Manikanthan
چکیده

Evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. In a variety of environments, RSS may vary due to lack of variations in the wireless channel; the extracted bits have very low entropy making these bits unsuitable for a secret key, In significant movement environment, high entropy bits are obtained fairly quickly. Develop an environment adaptive secret key generation scheme that uses an adaptive lossy quantizer in conjunction with Cascadebased information reconciliation and privacy amplification. Our measurements show that our scheme, in comparison to the existing ones that we generate high entropy bits at a high bit rate. The secret key bit streams generated by Adaptive secret bit generation (ASBG) scheme. Finally, we evaluate secret key extraction in a multiple input multiple output (MIMO)-like sensor network testbed that we create using multiple TelosB sensor nodes. Our MIMO-like sensor environment produces prohibitively high bit mismatch, which we address using an iterative distillation stage that we add to the key extraction process. Ultimately, we show that the secret key generation rate is increased when multiple sensors are involved in the key extraction process. Keywords—Adaptive secret bit generation, Received signal strength, TelosB sensor node, Cryptography

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shadowing Model For Secret Key Extraction From WSN

We propose a new solution for key generation process on the basis of Received Signal Strength (RSS) for wireless sensor nodes. We use simulation environments to show that RSS at both the communicating parties is same due to high data transmission rates is a random characteristic and can be used to generate a secret key. We also try to show that how it can become vulnerable if proper care is not...

متن کامل

Collaborative Group Key Extraction Leveraging Received Signal Strength in Real Mobile Environments

Secret key generation among wireless devices using physical layer information of radio channel has been an attractive alternative for ensuring security in mobile environments. Received Signal Strength (RSS) based secret key extraction gains much attention due to its readily availability in wireless infrastructure. However, the problem of using RSS to generate keys among multiple devices to ensu...

متن کامل

SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks

The increasing interest in the usage of wireless body area networks (WBAN) in healthcare and other critical applications underscores the importance of secure communication among the body sensor devices. Associating an unknown device with an existing network without prior knowledge of a secret key poses a major challenge. Existing authentication schemes in WBAN are typically based on received si...

متن کامل

Path loss exponent estimation for wireless sensor network localization

The wireless received signal strength (RSS) based localization techniques have attracted significant research interest for their simplicity. The RSS based localization techniques can be divided into two categories: the distance estimation based and the RSS profiling based techniques. The path loss exponent (PLE) is a key parameter in the distance estimation based localization algorithms, where ...

متن کامل

Modeling of WLAN Beacon Signal Strength Measured in an Indoor Environment

In the fourth generation wireless networks, it is believed that wireless LANs (WLANs) will interwork with cellular systems to provide fast speed data services. The integration of WLANs and cellular systems calls for a careful design of handover decisions. In WLANs, the received signal strength (RSS) is used for handover decision, thus a thorough understanding of the characteristics of the RSS o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014