Towards Wireless Secret Key Agreement With Lora Physical Layer

Senza categoria
  • 0
  • 12 Ottobre 2021

In the age of IoT, a mobile device is equipped with sensors and intelligence, in a heterogeneous architecture. Before providing this information, it is likely that PLS will also be influenced by other areas [56] such as physical security or biometrics [59]. Perhaps crKG and RF-Fingerprinting [60] techniques may be revolutionary for key exchange and authentication problems, but they still have limited and contradictory performance, as reported in the current literature. For example, in [61] 1 minute is required to generate 128-bit security keys, while in [62] only 16 ms is theoretically estimated for 256-bit security keys. S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N.

Patwari, S. V. Krishnamurthy, in Proc. 15th Annu. Int. Conf. The crowd. Calculation.

Netw. – MobiCom`09. On the effectiveness of secret extraction extraction from wireless signal strength in real environments, (2009), p. 321. Zhang, P. Patras, H. Haddadi, Apprentissage profond en réseau mobile et sans fil: a survey. CoRR.

abs/1803.04311: (2018). A. Badawy, T. Elfouly, T. Khattab, A. Mohamed, M. Guizani, Unleashing the secure potential of the wireless physical layer: secret key generation methods. Phys. Commun.19:, 1-10 (2016).

L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, Using the physical layer for Wireless authentication in time-variant channels. IEEE Trans. Wirel. Commun.7 (7), 2571-2579 (2008). There is already evidence that the frequency range offers greater power and flexibility for PLS: in [42], alice and Bob will receive a key generation of 90 bits per packet with only 5∼ of the key gap, while about tens of bits per second are generated by RSSI methods. Authentication: Alice and Bob must trust each other before performing CRCGs. This prelude could be achieved in the traditional way [85], for example by using secret keys stored by the device manufacturer and Challenge Response authentication methods. There are also PLS techniques such as PUF [87], Vicinity-Solution [61] or radio signature authentication [85, 88, 89]. RF Fingerprinting can be implemented today with good results [60, 90-95], thanks to the power of machine classification and aggregation and deep learning [96-98]. At this point, Eve can try to play as bob or Alice, and play a man-in-the-middle attack.[85] Authentication is not part of this work….