Puzzle: A Shape-based Secret Sharing Approach By Exploiting Channel Reciprocity in Frequency Domain
نویسندگان
چکیده
In this paper we propose a shape-based approach in frequency domain to extract a shared key by exploiting the observation that wireless channel is reciprocal due to multi-path fading. Unlike the traditional quantization approach in time domain, no training sequences or predetermined pulses are needed to be transmitted in our approach. The correlated power spectral density of the transmitted packets served as the common random source between Alice and Bob. We use Lowess smoothing to mitigate measurement errors and interference and then use pattern matching to encode the shape of the spectrum. We name the technique as Puzzle for secrets are generated by finding right pieces(shape patterns) and then putting them together. Implementation in softwaredefined radios (SDR) demonstrates the feasibility of extracting a 6-bit secret per measurement with an average bit mismatching rate 5% in a 20 MHz band. Experiments show that with eavesdropper near by, the leaked information of each secret bit generated by Puzzle is about 0.05 bit, which is low in comparison with a RSSI-based method ASBG.
منابع مشابه
Extract Secrets from Wireless Channel: A New Shape-based Approach
Existing secret key extraction techniques use quantization to map wireless channel amplitudes to secret bits. This paper shows that such techniques are highly prone to environment and local noise effects: They have very high mismatch rates between the two nodes that measure the channel between them. This paper advocates using the shape of the channel instead of the size (or amplitude) of the ch...
متن کاملOptimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels
Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013