首页> 外文期刊>IEEE transactions on industrial informatics >A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement
【24h】

A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement

机译:对设备辅助物理层密钥协议进行劫持攻击的会话

获取原文
获取原文并翻译 | 示例

摘要

Physical-layer key agreement is used to generate a shared key between devices on demand. Such schemes utilize the characteristics of the wireless channel to generate the shared key from the device-to-device channel. As all characteristics are time-dependent and location-dependent, it is hard for eavesdroppers to get the key. However, most research works in this area use passive attack models whereas active attacks that aim at manipulating the channel and key are also possible. Physical-layer key agreement with User Introduced Randomness (PHY-UIR) is a solution similar to the Diffie-Hellman protocol against such a kind of active attack. The users (devices) introduce their own randomness to help to prevent active attacks. In this paper, we analyze the possibility of launching a session hijacking attack on PHY-UIR to allow an attacker to control the shared key established. The session hijacking attack manipulates the key agreement through a man-in-the-middle interaction and forces legitimate devices to run the PHY-UIR protocol with the attacker. Our simulation and experiment results validate our attack and show the high performance of our attack on manipulating the generated key. We also propose PHY-UIR$ <^>{+}$ where devices simultaneously exchange information about the established shared keys, which allows them to detect whether they have agreed to different keys with a third party.
机译:物理层密钥协议用于根据需求生成设备之间的共享密钥。这种方案利用无线信道的特性来从设备到设备信道生成共享密钥。随着所有特征都是时间依赖性和位置依赖的,它很难让窃听者得到关键。然而,在该领域的大多数研究工作都使用被动攻击模型,而旨在操纵频道和钥匙的主动攻击也是可能的。与用户的物理层密钥协议引入了随机性(PHY-UIR)是一种类似于针对这种活动攻击的Diffie-Hellman协议的解决方案。用户(设备)介绍自己的随机性,以帮助防止主动攻击。在本文中,我们分析了在PHY-UIR上启动会话劫持攻击的可能性,以允许攻击者控制建立的共享密钥。会话劫持攻击通过中间人的交互和强制合法设备与攻击者运行Phy-UIR协议来操纵关键协议。我们的仿真和实验结果验证了我们的攻击,并显示了我们对操纵生成键的攻击的高性能。我们还提出了Phy-UIR $ <^> {+} $,其中设备同时交换有关已建立的共享密钥的信息,允许它们检测它们是否已同意与第三方的不同键。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号