Proceedings of the Twenty-Second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Net 2021
DOI: 10.1145/3466772.3467052
|View full text |Cite
|
Sign up to set email alerts
|

Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization

Abstract: Physical-layer based key generation schemes exploit the channel reciprocity for secret key extraction, which can achieve informationtheoretic secrecy against eavesdroppers. Such methods, although practical, have been shown to be vulnerable against man-in-themiddle (MitM) attacks, where an active adversary, Mallory, can influence and infer part of the secret key generated between Alice and Bob by injecting her own packet upon observing highly correlated channel/RSS measurements from Alice and Bob. As all the ch… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Since C i randomizes all its channels by simply reconfiguring its RA, no active or passive adversary can compromise all r j ∈ ℘ i values [30,211,237,19,154,326,236,93]. In honest settings, secrecy of the star-specific secret s i , generated by the aforementioned procedure, follows directly from the following three facts:…”
Section: Each Party Inmentioning
confidence: 99%
See 2 more Smart Citations
“…Since C i randomizes all its channels by simply reconfiguring its RA, no active or passive adversary can compromise all r j ∈ ℘ i values [30,211,237,19,154,326,236,93]. In honest settings, secrecy of the star-specific secret s i , generated by the aforementioned procedure, follows directly from the following three facts:…”
Section: Each Party Inmentioning
confidence: 99%
“…To defend against such attacks, we can apply techniques that allow us to detect an MITM attack over physical layer [303], and if one is detected, the antenna of ∂ i 's central hub, C i , can be reconfigured to randomize all channels in ∂ i [237]. This only requires a reconfigurable antenna (RA) at each central hub.…”
Section: Maximum Number Of Sskh Prfs and Defenses Against Various Att...mentioning
confidence: 99%
See 1 more Smart Citation