Abstract
New security solutions in the physical communication
layer - secret key extraction from the radio channel and
information-theoretic secrecy - protect confidentiality
of communication without cryptographic establishment of
secret keys. Unfortunately, they currently lack
authentication. Cryptographic mechanisms are still needed
to secure the first contact between previously unknown
devices - to guarantee that security pairings are made as
the user intends. In this paper, we contribute by
analyzing how five different security pairing approaches
can be realized or complemented with physical layer
solutions. We propose new solutions for replacing the use
of expensive crypto algorithms with secret key
extraction. We note that information-theoretic secrecy
solutions are less capable of surviving without
cryptographic authentication. However, in some
information-theoretic secrecy approaches, secure
out-of-band delivery of channel state information can
authenticate receivers
Original language | English |
---|---|
Title of host publication | International Conference on Privacy and Security in Mobile Systems (PRISMS 2014) |
Publisher | IEEE Institute of Electrical and Electronic Engineers |
Number of pages | 8 |
ISBN (Electronic) | 978-1-4799-4628-0 |
ISBN (Print) | 978-1-4799-4630-3 |
DOIs | |
Publication status | Published - 2014 |
MoE publication type | A4 Article in a conference publication |
Event | The 2nd International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 - Aalbor, Denmark Duration: 11 May 2014 → 14 May 2014 |
Conference
Conference | The 2nd International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 |
---|---|
Abbreviated title | PRISMS 2014 |
Country/Territory | Denmark |
City | Aalbor |
Period | 11/05/14 → 14/05/14 |
Keywords
- wireless
- authentication
- security pairing
- physical layer security
- information-theoretic secrecy
- key extraction