Configuration Hopping: A Secure Communication Protocol without Explicit Key Exchange

  • Yue Qiao
  • Kannan Srinivasan
  • Anish Arora
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8756)


By changing one or more physical layer parameters (such as spreading code, symbol duration, symbol constellation, center frequency, modulation method, transmission power, etc.) in an agreed upon manner between two communication parties, we are able to realize communication that is hard to detect, identify, and decode. We present a formal link layer protocol for secure communication based on this idea that, along with the use of channel reciprocity, notably eschews the use of cryptographic keys. We prove the security properties of the protocol in the Canetti-Krawczyk framework and study the feasibility of changing several physical layer parameters at the link packet level in Software Defined Radios.


Link Layer Spreading Code Forward Secrecy Symbol Duration Channel Reciprocity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Arora, A., Sang, L.: Dialog codes for secure wireless communications. In: Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, IPSN 2009, pp. 13–24. IEEE Computer Society (2009)Google Scholar
  5. 5.
    Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007 (2007)Google Scholar
  6. 6.
    Best, R.E.: Phase-Locked Loops. Professional Engineering. Mcgraw-hill (2003)Google Scholar
  7. 7.
    Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    Jain, M., Choi Il, J., Kim, T., Bharadia, D., Seth, S., Srinivasan, K., Levis, P., Katti, S., Sinha, P.: Practical, real-time, full duplex wireless. In: Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, MobiCom 2011 (2011)Google Scholar
  10. 10.
    Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series). Chapman & Hall/CRC (2007)Google Scholar
  11. 11.
    Madiseh, M.G., McGuire, M.L., Neville, S.S., Cai, L., Horie, M.: Secret key generation and agreement in UWB communication channels. In: Proceedings of the Global Communications Conference, GLOBECOM 2008, pp. 1842–1846. IEEE (2008)Google Scholar
  12. 12.
    Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008 (2008)Google Scholar
  13. 13.
    Patwari, N., Croft, J., Jana, S., Kasera, S.K.: High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing 9(1), 17–30 (2010)CrossRefGoogle Scholar
  14. 14.
    Qiao, Y., Srinivasan, K., Arora, A.: Shape matters, not the size: A new approach to extract secrets from channel. In: The Proccedings of the First ACM Workshop on Hot Topics in Wireless, HotWireless 2014 (2014)Google Scholar
  15. 15.
    Rappaport, T.: Wireless Communications: Principles and Practice, 2nd edn. Prentice Hall PTR (2001)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Yue Qiao
    • 1
  • Kannan Srinivasan
    • 1
  • Anish Arora
    • 1
    • 2
  1. 1.Department of Computer Science and EngineeringThe Ohio State UniveristyColumbusUSA
  2. 2.The Samraksh CompanyDublinUSA

Personalised recommendations