Abstract | ||
---|---|---|
Security methods have traditionally been deployed in the upper layers of the protocol stack. Therefore, the properties of the physical layer, like the wireless channel, have remained unexplored for authentication and confidentiality purposes. Some methods to expand the security mechanisms to lower levels have been suggested and thoroughly analyzed. The usage of the wireless channel for the development of key exchange protocols is based on two main properties: reciprocity and multipath propagation on fading channels. Several methods on how to extract and generate common secrecy using these properties have already been proposed. However, some security drawbacks have also been identified. In this paper, we propose to increase the security of these techniques by additionally utilizing hardware-related properties, namely the impairments in the transceivers' local oscillators. The validation of this technique is performed in an experimental setup using the USRP/GNU Radio software-defined radio platform. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/978-3-319-15087-1_22 | INFORMATION SECURITY APPLICATIONS, WISA 2014 |
Keywords | Field | DocType |
Confidentiality, Physical layer, Reciprocity, Fading, Frequency, Impairments, Local oscillator | Multipath propagation,Authentication,Wireless,Key exchange,Computer science,Fading,Universal Software Radio Peripheral,Computer network,Physical layer,Protocol stack | Conference |
Volume | ISSN | Citations |
8909 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 8 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jörn Müller-Quade | 1 | 361 | 38.34 |
Antonio Sobreira de Almeida | 2 | 0 | 0.34 |