European Symposium on Research in Computer Security

Computer Security -- ESORICS 2015 pp 332-351 | Cite as

vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge

  • Wei Wang
  • Jingqiang Lin
  • Zhan Wang
  • Ze Wang
  • Luning Xia
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9327)

Abstract

Establishing secure channels between two wireless devices without any prior knowledge is challenging, especially when such devices only have very simple user interface. Most existing authentication and key negotiation solutions leverage the received signal strength (RSS) of wireless signals, and the security guarantees depend on the environments too much; in a static environment of less motion, the adversaries could control or predict the RSS of legitimate devices. We propose vBox in this paper, a proactive method to establish secure channels between wireless devices, without the assumption on environments. By holding and waving two devices to communicate, the owner creates a virtual “shield box”. The adversaries outside the box cannot send signals with stable RSS into the box, so the legitimate devices can easily be authenticated based on the variation of RSS. At the same time, the adversaries cannot correctly measure or detect the RSS of wireless signals transmitted between the in-box devices, and then they can directly transmit secret keys in plaintext. Then, after the simple operation by the owner for a few seconds, the authenticated nodes will securely communicate using the shared secret key. We implement the vBox prototype on commercial-off-the-shelf ZigBee devices, and evaluate it with extensive experiments under the normal case and several attack scenarios. The experiment results and security analysis show that, vBox establishes secure channels handily against various attacks and is suitable for different environments.

Keywords

Authentication Key establishment Received signal strength Wireless personal area network 

References

  1. 1.
  2. 2.
  3. 3.
    Aono, T., Higuchi, K., Ohira, T., Komiyama, B., Sasaoka, H.: Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Trans. Antennas Propag. 53, 3776–3784 (2005)CrossRefGoogle Scholar
  4. 4.
    Cai, L., Zeng, K., Chen, H., Mohapatra, P.: Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011 (2011)Google Scholar
  5. 5.
    Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MOBICOM 2009, pp. 321–332 (2009)Google Scholar
  6. 6.
    Kalamandeen, A., Scannell, A., de Lara, E., Sheth, A., LaMarca, A.: Ensemble: cooperative proximity-based authentication. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), pp. 331–344 (2010)Google Scholar
  7. 7.
    Mathur, S., Trappe, W., Mandayam, N.B., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, pp. 128–139 (2008)Google Scholar
  8. 8.
    Divya, M.: Bit error rate performance of bpsk modulation and ofdm-bpsk with rayleigh multipath channel. Int. J. Eng. Adv. Technol. (IJEAT) 2(4), 623–626 (2013). ISSN: 2249-8958Google Scholar
  9. 9.
    Neskovic, A., Neskovic, N., Paunovic, G.: Modern approaches in modeling of mobile radio systems propagation environment. IEEE Commun. Surv. Tutorials 3(3), 2–12 (2000)CrossRefGoogle Scholar
  10. 10.
    Patwari, N., Kasera, S.K.: Robust location distinction using temporal link signatures. In: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, pp. 111–122 (2007)Google Scholar
  11. 11.
    Rappaport, T.S.: Wireless communications - principles and practice. Prentice Hall, Upper Saddle River (1996)MATHGoogle Scholar
  12. 12.
    Rappaport, T., Milstein, L.: Effects of radio propagation path loss on ds-cdma cellular frequency reuse efficiency for the reverse channel. IEEE Trans. Veh. Technol. 41(3), 231–242 (1992)CrossRefGoogle Scholar
  13. 13.
    Shi, L., Li, M., Yu, S., Yuan, J.: BANA: body area network authentication exploiting channel characteristics. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2012, pp. 27–38 (2012)Google Scholar
  14. 14.
    Tope, M.A., McEachen, J.C.: Unconditionally secure communications over fading channels. In: MILCOM, Military Communications Conference (2001)Google Scholar
  15. 15.
    Wilson, R.D., Tse, D., Scholtz, R.A.: Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Trans. Inf. Forensics Secur. 2, 364–375 (2007)CrossRefGoogle Scholar
  16. 16.
    Zeng, K., Govindan, K., Mohapatra, P.: Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Commun. 17(5), 56–62 (2010)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Wei Wang
    • 1
    • 2
    • 3
  • Jingqiang Lin
    • 1
    • 2
  • Zhan Wang
    • 1
    • 2
  • Ze Wang
    • 1
    • 2
  • Luning Xia
    • 1
    • 2
  1. 1.Data Assurance and Communication Security Research CenterChinese Academy of SciencesBeijingChina
  2. 2.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  3. 3.University of Chinese Academy of SciencesBeijingChina

Personalised recommendations