首页> 外文期刊>IEEE transactions on dependable and secure computing >Manipulative Attack Against Physical Layer Key Agreement and Countermeasure
【24h】

Manipulative Attack Against Physical Layer Key Agreement and Countermeasure

机译:防范物理层关键协议的操纵攻击及对策

获取原文
获取原文并翻译 | 示例

摘要

Physical layer key agreement techniques derive a symmetric cryptographic key from the wireless fading channel between two wireless devices by exploiting channel randomness and reciprocity. Current efforts have focused mainly on the security issue and protocol design of the techniques under passive attack and jamming attack. In this paper, we raise the subject of manipulative attack. The attacker wants the keying devices to actually agree on some valid, but manipulated bits. We discuss the feasibility and different means to launch manipulative attack. Aiming at a practical countermeasure, we further propose PHY-UIR (PHYsical layer key agreement with User Introduced Randomness). Both keying devices generate and use random voltage levels X = {x[1],x[2] ... x[N]} and Y = {y[1],y[2] ... y[N]} to exchange probing frames over reciprocal random fading channels H = {h[1],h[2] ... h[N]}. At receiving end, they multiply the received channel measurements XH and YH with the random sequences Y and X to compose a common keying sequence XYH. With this solution, the attacker can no longer manipulate the keying sequences established at legitimate sides and infer the subsequent key. We analyze the security strength of PHY-UIR and conduct extensive simulations to evaluate it. We also perform proof-of-concept experiments by using software defined radios in a real-world environment. Both simulations and experiments demonstrate the effectiveness of PHY-UIR.
机译:物理层密钥协议技术通过利用通道随机性和互动来源于两个无线设备之间的无线衰落通道的对称密码。目前的努力主要集中在被动攻击和干扰攻击下技术的安全问题和协议设计。在本文中,我们提出了操纵攻击的主题。攻击者希望键控设备实际达成一致,但有效但是操纵位。我们讨论了启动操纵攻击的可行性和不同手段。旨在实现实际对策,我们进一步提出了Phy-UIR(与用户引入了随机性的物理层密钥协议)。两个键控设备都会生成和使用随机电压电平x = {x [1],x [2] ... x [n]}和y = {y [1],y [2] ... y [n]}交换探测框架上互易随机衰落通道H = {H [1],H [2] ...... H [n]}。在接收端时,它们将接收的通道测量XH和YH乘以随机序列y和x来组成公共键控序列xyh。通过这种解决方案,攻击者无法更长的操作,可以操纵在合法边的键控序列并推断后续密钥。我们分析了PHY-UIR的安全实力,并进行广泛的模拟来评估它。我们还通过在现实世界环境中使用软件定义的无线电来执行概念证明实验。两者的模拟和实验都证明了Phy-UIR的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号