Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secret-Free Device Pairing in the mmWave Band (2306.17330v1)

Published 29 Jun 2023 in cs.CR and eess.SP

Abstract: Many Next Generation (NextG) applications feature devices that are capable of communicating and sensing in the Millimeter-Wave (mmWave) bands. Trust establishment is an important first step to bootstrap secure mmWave communication links, which is challenging due to the lack of prior secrets and the fact that traditional cryptographic authentication methods cannot bind digital trust with physical properties. Previously, context-based device pairing approaches were proposed to extract shared secrets from common context, using various sensing modalities. However, they suffer from various limitations in practicality and security. In this work, we propose the first secret-free device pairing scheme in the mmWave band that explores the unique physical-layer properties of mmWave communications. Our basic idea is to let Alice and Bob derive common randomness by sampling physical activity in the surrounding environment that disturbs their wireless channel. They construct reliable fingerprints of the activity by extracting event timing information from the channel state. We further propose an uncoordinated path hopping mechanism to resolve the challenges of beam alignment for activity sensing without prior trust. A key novelty of our protocol is that it remains secure against both co-located passive adversaries and active Man-in-the-Middle attacks, which is not possible with existing context-based pairing approaches. We implement our protocol in a 28GHz mmWave testbed, and experimentally evaluate its security in realistic indoor environments. Results show that our protocol can effectively thwart several different types of adversaries.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (18)
  1. [n. d.]. https://www.tmytek.com/solutions/mmW-SDR
  2. 2012. IEEE Standard for Information technology–Telecommunications and information exchange between systems–Local and metropolitan area networks–Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band.
  3. Millimeter wave channel modeling and cellular capacity evaluation. IEEE journal on selected areas in communications 32, 6 (2014), 1164–1179.
  4. Physical layer identification based on spatial–temporal beam features for millimeter-wave wireless networks. IEEE Transactions on Information Forensics and Security 15 (2019), 1831–1845.
  5. Modeling and analysis of eavesdropping attack in 802.11 ad mmWave wireless networks. IEEE Access 7 (2019), 70355–70370.
  6. Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards & Technology.
  7. A practical man-in-the-middle attack on signal-based key generation protocols. In Computer Security–ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 17. Springer, 235–252.
  8. One Key to Rule Them All: Secure Group Pairing for Heterogeneous IoT Devices. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 1693–1709.
  9. Towards position-independent sensing for gesture recognition with Wi-Fi. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 2 (2021), 1–28.
  10. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 836–852.
  11. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on Mobile computing and networking. 321–332.
  12. Towards environment independent device free human activity recognition. In Proceedings of the 24th annual international conference on mobile computing and networking. 289–304.
  13. Physical layer key generation using virtual AoA and AoD of mmWave massive MIMO channel. In 2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 1–9.
  14. Physical layer key generation in 5G wireless networks. IEEE Wireless Communications 26, 5 (2019), 48–54.
  15. Ari Juels and Martin Wattenberg. 1999. A fuzzy commitment scheme. In Proceedings of the 6th ACM conference on Computer and communications security. 28–36.
  16. Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities. Entropy 21, 5 (2019), 497.
  17. T2pair: Secure and usable pairing for heterogeneous iot devices. In Proceedings of the 2020 acm sigsac conference on computer and communications security. 309–323.
  18. Soli: Ubiquitous gesture sensing with millimeter wave radar. ACM Transactions on Graphics (TOG) 35, 4 (2016), 1–19.

Summary

We haven't generated a summary for this paper yet.