Security Pairings using Physical Layer Properties of Wireless Communications

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    New security solutions in the physical communication layer - secret key extraction from the radio channel and information-theoretic secrecy - protect confidentiality of communication without cryptographic establishment of secret keys. Unfortunately, they currently lack authentication. Cryptographic mechanisms are still needed to secure the first contact between previously unknown devices - to guarantee that security pairings are made as the user intends. In this paper, we contribute by analyzing how five different security pairing approaches can be realized or complemented with physical layer solutions. We propose new solutions for replacing the use of expensive crypto algorithms with secret key extraction. We note that information-theoretic secrecy solutions are less capable of surviving without cryptographic authentication. However, in some information-theoretic secrecy approaches, secure out-of-band delivery of channel state information can authenticate receivers
    Original languageEnglish
    Title of host publicationProceedings
    Subtitle of host publicationInternational Conference on Privacy and Security in Mobile Systems, PRISMS 2014
    Number of pages8
    ISBN (Electronic)978-1-4799-4628-0
    DOIs
    Publication statusPublished - 2014
    MoE publication typeA4 Article in a conference publication
    EventThe 2nd International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 - Aalbor, Denmark
    Duration: 11 May 201414 May 2014

    Conference

    ConferenceThe 2nd International Conference on Privacy and Security in Mobile Systems, PRISMS 2014
    Abbreviated titlePRISMS 2014
    CountryDenmark
    CityAalbor
    Period11/05/1414/05/14

    Keywords

    • wireless
    • authentication
    • security pairing
    • physical layer security
    • information-theoretic secrecy
    • key extraction

    Fingerprint Dive into the research topics of 'Security Pairings using Physical Layer Properties of Wireless Communications'. Together they form a unique fingerprint.

  • Cite this

    Suomalainen, J., Evesti, A., & Kotelba, A. (2014). Security Pairings using Physical Layer Properties of Wireless Communications. In Proceedings: International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 https://doi.org/10.1109/PRISMS.2014.6970593