Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing http://networks.cs.usm.edu.

Similar presentations


Presentation on theme: "“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing http://networks.cs.usm.edu."— Presentation transcript:

1 “Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing

2 Outline Information Security 101 Wireless Channel Characteristics
Wireless Physical Security 10/27/2019 10/27/2019 2

3 Outline Information Security 101 Wireless Channel Characteristics
Wireless Physical Security 10/27/2019 10/27/2019 3

4 Security Model Secrecy / Confidentiality Authentication / Integrity
10/27/2019

5 Encryption Conventional Encryption (Shared Key Encryption, Symmetric Encryption) 10/27/2019 10/27/2019 5

6 Encryption Public-Private Key Encryption (PKI, asymmetric encryption)
10/27/2019 10/27/2019 6

7 Encryption Shared Key PKI Fast Hard in key distribution Slow
Easy in key distribution But require infrastructure 10/27/2019

8 Wireless Communication
Channel uncorrelated at different locations 10/27/2019 10/27/2019 8

9 Wireless Communication
Channel reciprocity 10/27/2019 10/27/2019 9

10 Wireless Signal Symbol
10/27/2019 10/27/2019 10

11 Key Generation Metrics Goals (controversial)
Channel Response; Received Signal Strength, Phase Goals (controversial) fast strong 10/27/2019

12 Generation Procedures
Probing / Sampling Quantization Information Reconciliation Privacy Amplification 10/27/2019

13 Design Issues Probing Sampling time duplex Time selective
Interpolation ---finite impulse response (FIR) fractional delay filter Time selective Frequency selective Sampling Autocorrelation -- key strength Frequency (open question) 10/27/2019

14 Design Issues Quantization
More levels, more bits, but less agreement Information Reconciliation --- key agreement hash (verification) + exhaustive search (correction) Correction codes interactive information reconciliation protocol Privacy Amplification Leftover hash lemma 10/27/2019

15 10/27/2019


Download ppt "“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing http://networks.cs.usm.edu."

Similar presentations


Ads by Google