Proceedings of the 2015 New Security Paradigms Workshop 2015
DOI: 10.1145/2841113.2841117
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting the Physical Environment for Securing the Internet of Things

Abstract: Using the randomness provided by the physical environment to build security solutions has received much attention recently. In particular, the shared entropy provided by measuring ambient audio, luminosity modalities or electromagnetic emanations has been used to build locationbased, proximity-based, or context-based security mechanisms. The majority of those protocols is based on a standard model consisting channel probing, quantization, information reconciliation, privacy amplification, and key verification.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 63 publications
(88 reference statements)
0
5
0
Order By: Relevance
“…These steps are similar to existing works in the field of CRKG and are thus not particularly designed in this paper. We refer the interested reader to [25]- [28].…”
Section: B Process Of Crkgmentioning
confidence: 99%
“…These steps are similar to existing works in the field of CRKG and are thus not particularly designed in this paper. We refer the interested reader to [25]- [28].…”
Section: B Process Of Crkgmentioning
confidence: 99%
“…Some of the parameters that determine c T are maximum Doppler shift D f as shown in Equation 6 . Probing channel mechanism affected by the probing rate is p r and the sampling rate is s r [32]. Probing rate is the interval between the probing request and reply, and the sampling rate is the interval between the probing requests with one another.…”
Section: A Principle and Preliminariesmentioning
confidence: 99%
“…The Doppler Frequency f obtained is 9.6 GHz (the speed of movement multiplied by the carrier frequency divided by the speed of light) so the coherence time obtained is 104.2 ms (1/|f|). Randomness requirements can be fulfilled if the time interval tm exceeds coherence time [46] so we select time interval 110 ms. In this paper, there are 4000 RSS channel characteristics captured by each node.…”
Section: Implementation and Performance Evaluationmentioning
confidence: 99%
“…The lower the computing time and the communication overhead required, the more efficient the built key generation system. There are 4 existing key generation systems that will be used for comparison, i.e., system [9,31,33,46,48]. The system [9] uses four phases where the RSS channel characteristics will be quantized using the cumulative distribution function (CDF) method.…”
Section: Implementation and Performance Evaluationmentioning
confidence: 99%