Abstract
Original language | English |
---|---|
Title of host publication | Proceedings |
Subtitle of host publication | International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 |
Number of pages | 8 |
ISBN (Electronic) | 978-1-4799-4628-0 |
DOIs | |
Publication status | Published - 2014 |
MoE publication type | A4 Article in a conference publication |
Event | The 2nd International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 - Aalbor, Denmark Duration: 11 May 2014 → 14 May 2014 |
Conference
Conference | The 2nd International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 |
---|---|
Abbreviated title | PRISMS 2014 |
Country | Denmark |
City | Aalbor |
Period | 11/05/14 → 14/05/14 |
Fingerprint
Keywords
- wireless
- authentication
- security pairing
- physical layer security
- information-theoretic secrecy
- key extraction
Cite this
}
Security Pairings using Physical Layer Properties of Wireless Communications. / Suomalainen, Jani; Evesti, Antti; Kotelba, Adrian.
Proceedings: International Conference on Privacy and Security in Mobile Systems, PRISMS 2014. 2014.Research output: Chapter in Book/Report/Conference proceeding › Conference article in proceedings › Scientific › peer-review
TY - GEN
T1 - Security Pairings using Physical Layer Properties of Wireless Communications
AU - Suomalainen, Jani
AU - Evesti, Antti
AU - Kotelba, Adrian
N1 - Project code: 78608
PY - 2014
Y1 - 2014
N2 - New security solutions in the physical communication layer - secret key extraction from the radio channel and information-theoretic secrecy - protect confidentiality of communication without cryptographic establishment of secret keys. Unfortunately, they currently lack authentication. Cryptographic mechanisms are still needed to secure the first contact between previously unknown devices - to guarantee that security pairings are made as the user intends. In this paper, we contribute by analyzing how five different security pairing approaches can be realized or complemented with physical layer solutions. We propose new solutions for replacing the use of expensive crypto algorithms with secret key extraction. We note that information-theoretic secrecy solutions are less capable of surviving without cryptographic authentication. However, in some information-theoretic secrecy approaches, secure out-of-band delivery of channel state information can authenticate receivers
AB - New security solutions in the physical communication layer - secret key extraction from the radio channel and information-theoretic secrecy - protect confidentiality of communication without cryptographic establishment of secret keys. Unfortunately, they currently lack authentication. Cryptographic mechanisms are still needed to secure the first contact between previously unknown devices - to guarantee that security pairings are made as the user intends. In this paper, we contribute by analyzing how five different security pairing approaches can be realized or complemented with physical layer solutions. We propose new solutions for replacing the use of expensive crypto algorithms with secret key extraction. We note that information-theoretic secrecy solutions are less capable of surviving without cryptographic authentication. However, in some information-theoretic secrecy approaches, secure out-of-band delivery of channel state information can authenticate receivers
KW - wireless
KW - authentication
KW - security pairing
KW - physical layer security
KW - information-theoretic secrecy
KW - key extraction
U2 - 10.1109/PRISMS.2014.6970593
DO - 10.1109/PRISMS.2014.6970593
M3 - Conference article in proceedings
SN - 978-1-4799-4630-3
BT - Proceedings
ER -