首页> 外文OA文献 >Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics
【2h】

Security Mechanisms for Personal Devices Employing Wireless Channel Characteristics

机译:利用无线信道特性的个人设备的安全机制

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The tremendous development in wireless technology has lead to accessing abundant information at one's convenient location using hand-held and personal devices. Though the wireless medium provides numerous advantages, on the flip side there are a number of threats associated with security like authenticity, confidentiality, and message integrity. The traditional cryptographic algorithms requiring public key infrastructure are expensive for resource constrained personal devices. Hence, researchers are exploring alternative mechanisms that are light-weight and do not add an overhead for the complexity in terms of hardware or computation. The susceptibility of wireless signals to noise and fading can be converted to advantages and exploited for security aspects of the system. In this thesis, we make three novel contributions. First, we propose SeAK, a secure device pairing protocol based on received signal strength (RSS) obtained by dual-antenna transceivers utilizing spatial diversity. With spatially separated antennas, the RSS values from a nearby device are large and distinct, as opposed to those from a far-away device. We demonstrate that SeAK achieves a 100% success acceptance rate, securely authenticates a nearby device and generates a 128-bit secret key within milliseconds. Second, we explore the feasibility of generating secret keys between two devices which do not possess direct link, with the help of a trusted relay and RSS. We analyse the performance of our protocol for single and multiple bit quantization schemes. Our results reveal that the secret bit rate increases for multiple bit quantization where as the bit agreement decreases. The protocol generates good entropy key when all the three nodes are mobile. Finally, we present a novel location proof generation and verification protocol for personal devices for location based services (LBS). LBS provide privileges to mobile users based on their proximity to a facility. In order to gain benefits, users may falsely claim their location. Hence, it is essential to verify the legitimacy of users. We propose two variants of our protocol exploiting unique channel characteristics that employ cryptographic primitives - fuzzy vault and fuzzy extractor respectively. The theoretical and experimental results prove that the generated location proof is non-modifiable, non-transferrable, and offers good security.
机译:无线技术的巨大发展已导致使用手持式和个人设备在自己方便的位置访问大量信息。尽管无线介质具有许多优点,但另一方面,与安全性相关的威胁却很多,例如真实性,机密性和消息完整性。对于资源受限的个人设备而言,需要公钥基础结构的传统密码算法昂贵。因此,研究人员正在探索重量轻且不会增加硬件或计算复杂性开销的替代机制。无线信号对噪声和衰落的敏感性可以转换为优势,并可以用于系统的安全方面。在本文中,我们做出了三点新颖的贡献。首先,我们提出SeAK,一种基于接收信号强度(RSS)的安全设备配对协议,该协议是由利用空间分集的双天线收发器获得的。在空间上分开的天线中,与附近设备相比,附近设备的RSS值较大且不同。我们证明,SeAK可以达到100%的成功接受率,可以安全地对附近的设备进行身份验证,并可以在毫秒内生成128位的密钥。其次,我们借助可信中继和RSS,探讨了在不具有直接链接的两个设备之间生成秘密密钥的可行性。我们分析了单比特和多比特量化方案的协议性能。我们的结果表明,对于多比特量化,秘密比特率会增加,其中随着比特一致性的降低。当所有三个节点都处于移动状态时,该协议会生成良好的熵密钥。最后,我们为基于位置服务(LBS)的个人设备提出了一种新颖的位置证明生成和验证协议。 LBS根据移动用户对设施的接近程度为其提供特权。为了获得利益,用户可能会错误地声明其位置。因此,至关重要的是验证用户的合法性。我们提出了利用独特的通道特性(使用模糊原语)的两种协议变体,它们分别采用了加密原语-模糊库和模糊提取器。理论和实验结果证明所生成的位置证明是不可修改的,不可转让的,并且提供了良好的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号