多媒體網路安全實驗室 Mobility Assisted Secret Key Generation Using Wireless Link Signatures Date:2012.04.05 Reporter : Hong Ji Wei Auther : Junxing Zhang Kasera,

Slides:



Advertisements
Similar presentations
Secure Location Verification with Hidden and Mobile Base Stations -TMC Apr, 2008 Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagalj, Mani Srivastava.
Advertisements

多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Secure Multiparty Computations on Bitcoin
Error Control Code.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Cellular Communications
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Transmission Errors Error Detection and Correction
Self proxy signature scheme IJCSNS International Journal of Computer Science and Network Security,VOL.7 No.2,Februry 2007 Author:Young-seol Kim,Jik Hyun.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
SWE 423: Multimedia Systems Chapter 7: Data Compression (2)
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
Transmission Characteristics 1. Introduction (Information Interchange codes) 2. Asynchronous and Synchronous Transmissions 3. Error detection (bit errors)
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Reliability and Channel Coding
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Transmission Errors Error Detection and Correction
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
CSCI 5857: Encoding and Encryption
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
多媒體網路安全實驗室 A Security Framework of Group Location-Based Mobile Applications in Cloud Computing Date : Reporter : Hong Ji Wei Authors : Yu-Jia.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Channel Coding Part 1: Block Coding
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
多媒體網路安全實驗室 Protecting the Privacy of Users in e-Commerce Environment Date: Reporter:Chien-Wen Huang Author: Chun-Hua Chen and Gwoboa Horng 出處:
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
DIGITAL COMMUNICATIONS Linear Block Codes
多媒體網路安全實驗室 Certificateless multi-proxy signature Date:2011/04/08 報告人:向峻霈 出處 : Zhengping Jin, Qiaoyan Wen: Computer Communications, pp ,2011.
多媒體網路安全實驗室 Ontological recommendation multi-agent for Tainan City travel Date : Speaker : Hong Ji Wei Authors : Chang-Shing, Lee,Young-Chung.
多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Advancing Wireless Link Signatures for Location Distinction Mobicom 2008 Junxing Zhang, Mohammad H. Firooz Neal Patwari, Sneha K. Kasera University of.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
多媒體網路安全實驗室 Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments Date:2011/05/05 報告人:向峻霈 出處 : Jalal Al-Muhtadi,
Computer Communication & Networks Lecture 10 Datalink Layer: Error Correction Waleed Ejaz
Data Link Layer. Data Link Layer Topics to Cover Error Detection and Correction Data Link Control and Protocols Multiple Access Local Area Networks Wireless.
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
1 Lecture 7 System Models Attributes of a man-made system. Concerns in the design of a distributed system Communication channels Entropy and mutual information.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
1 st semester 1436 / Modulation Continuous wave (CW) modulation AM Angle modulation FM PM Pulse Modulation Analog Pulse Modulation PAMPPMPDM Digital.
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
A Secure and Efficient Application Download Architecture in 3G Mobile Environment Speaker: Kuo-Zhe Chiou Laboratory of Cryptography and Information Security.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
V. Non-Binary Codes: Introduction to Reed Solomon Codes
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/12 報告人:向峻霈.
Lightweight Mutual Authentication for IoT and Its Applications
Certificateless signature revisited
Emoticon-based Text Steganography in Chat
基於邊緣吻合向量量化編碼 法之資訊隱藏 張 真 誠 逢甲大學 講座教授 中正大學 榮譽教授、合聘教授 清華大學 合聘教授
Emoticon-based Text Steganography in Chat
Presentation transcript:

多媒體網路安全實驗室 Mobility Assisted Secret Key Generation Using Wireless Link Signatures Date: Reporter : Hong Ji Wei Auther : Junxing Zhang Kasera, S.K. Patwari, N. 出處 : INFOCOM, 2010 Proceedings IEEEINFOCOM, 2010 Proceedings IEEE

多媒體網路安全實驗室 Outline INTRODUCTION 1 ADVERSARY MODEL 2 MOBILITY ASSISTED KEY ESTABLISHMENT 33 PROTOCOL EVALUATION 44 CONCLUTIONS 35

多媒體網路安全實驗室 INTRODUCTION  these link signatures can be measured almost symmetrically between two ends of a wireless link.  location locking attack:the adversary steals some signature measurements it has a good chance to determine the key generated.  CIR:the channel impulse response

多媒體網路安全實驗室  the wireless link signatures at different unpredictable locations and combine these measurements to produce strong secret keys.  Using extensive measurements in both indoor and outdoor settings  (i) when movement step size is larger than one foot the measured CIRs are mostly uncorrelated  (ii) more diffusion in the mobility results in less correlation in the measured CIRs

多媒體網路安全實驗室 ADVERSARY MODEL  an adversary:that can overhear all the communication between the two devices A and B.  Assume that the adversary cannot cause a person-in-the-middle attack.  Our adversary is also not interested in causing any Denial-of-Service attacks

多媒體網路安全實驗室 MOBILITY ASSISTED KEY ESTABLISHM ENT A.Key Establishment Protocol Phase1:SIGGEN (short for signature generation)  A and B exchange SIGGEN and SIGACK messages.  Between each pair of SIGGEN and SIGACK message exchange, A and B individually, or both move to a new location.

多媒體網路安全實驗室 Phase2:SIGCHK (short for signature check)  Upon receiving the SIGCHK message from A, B quantizes all CIR it has measured and removes any duplicates.  then encodes the remaining quantized CIRs to produce both message symbols and parity symbols.  B sends only the parity symbols to A in multiple SIGFEC (short for signature forward error correction) messages.  A quantizes the corresponding CIRs that she had measured and encodes them to produce message symbols.

多媒體網路安全實驗室  A then combines her message symbols with parity symbols she receives from B to obtain a bit stream that is identical to that of B.  In the final KEYGEN (short for key generation) phase, A and B generate a new secret key with the reconciled bit streams and verify.  To convert the bit stream obtained: utilize a key compression function(SHA-256, SHA-384, and SHA-512).

多媒體網路安全實驗室 B. Quantization and Bit Extraction  Because CIRs are continuous random variables, must quantize them in order to use them for secret key generation.  first normalize each CIR with its maximum element value.  Next, to quantize the normalized CIR to 2 q discrete values with equal intervals.  simply convert integers in the resulting vector to their binary representation to extract the initial bits.

多媒體網路安全實驗室  C. Jigsaw Encoding  the simple uniform quantization cannot preserve reciprocity and even increase the discrepancy rate in quantized CIRs.

多媒體網路安全實驗室

D. RS Error Correction  adopt the RS forward error correction (FEC) scheme  Each RS output codeword has p symbols including k input symbols followed by 2 × t parity symbols.  t :the errorcorrection capability  ε:the link signature discrepancy rate.

多媒體網路安全實驗室  the computational complexity Γ  EX: 1.For m = 10 and q = 5, it is larger than For m = 10 and q = 1, 2, it is in the order of 2 427

多媒體網路安全實驗室 PROTOCOL EVALUATION  A. Measurement Campaign  we use three mobility models: random walk, Levy walk, and Brownian motion  Levy walk:  Brownian motion: 懸浮在液體或氣體中的微粒所 作的永不停息的無規則運動

多媒體網路安全實驗室  Impact of Mobility on Link Signatures

多媒體網路安全實驗室

C.Quality of Key Generation

多媒體網路安全實驗室  we use a metric called Secret Bit Rate that is defined as the average number of secret bits extracted from each channel response.  We plot the entropy values of the bit stream generated with different quantization bit numbers (per channel response).

多媒體網路安全實驗室

CONCLUTIONS  We propose an approach where wireless devices,interested in establishing a secret key.  Our results show that our scheme generates very high entropy secret bits and that too at a high bit rate.

多媒體網路安全實驗室