Skip to main content

Configuration Hopping: A Secure Communication Protocol without Explicit Key Exchange

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8756))

Abstract

By changing one or more physical layer parameters (such as spreading code, symbol duration, symbol constellation, center frequency, modulation method, transmission power, etc.) in an agreed upon manner between two communication parties, we are able to realize communication that is hard to detect, identify, and decode. We present a formal link layer protocol for secure communication based on this idea that, along with the use of channel reciprocity, notably eschews the use of cryptographic keys. We prove the security properties of the protocol in the Canetti-Krawczyk framework and study the feasibility of changing several physical layer parameters at the link packet level in Software Defined Radios.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. NI PXIe-1082 user manual, http://www.ni.com/pdf/manuals/372752b.pdf

  2. RF-switches, http://www.analog.com/en/switchesmultiplexers/rf-switches

  3. USRP N210, https://www.ettus.com/product/details/UN210-KIT

  4. Arora, A., Sang, L.: Dialog codes for secure wireless communications. In: Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, IPSN 2009, pp. 13–24. IEEE Computer Society (2009)

    Google Scholar 

  5. Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007 (2007)

    Google Scholar 

  6. Best, R.E.: Phase-Locked Loops. Professional Engineering. Mcgraw-hill (2003)

    Google Scholar 

  7. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  9. Jain, M., Choi Il, J., Kim, T., Bharadia, D., Seth, S., Srinivasan, K., Levis, P., Katti, S., Sinha, P.: Practical, real-time, full duplex wireless. In: Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, MobiCom 2011 (2011)

    Google Scholar 

  10. Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series). Chapman & Hall/CRC (2007)

    Google Scholar 

  11. Madiseh, M.G., McGuire, M.L., Neville, S.S., Cai, L., Horie, M.: Secret key generation and agreement in UWB communication channels. In: Proceedings of the Global Communications Conference, GLOBECOM 2008, pp. 1842–1846. IEEE (2008)

    Google Scholar 

  12. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom 2008 (2008)

    Google Scholar 

  13. Patwari, N., Croft, J., Jana, S., Kasera, S.K.: High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing 9(1), 17–30 (2010)

    Article  Google Scholar 

  14. Qiao, Y., Srinivasan, K., Arora, A.: Shape matters, not the size: A new approach to extract secrets from channel. In: The Proccedings of the First ACM Workshop on Hot Topics in Wireless, HotWireless 2014 (2014)

    Google Scholar 

  15. Rappaport, T.: Wireless Communications: Principles and Practice, 2nd edn. Prentice Hall PTR (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Qiao, Y., Srinivasan, K., Arora, A. (2014). Configuration Hopping: A Secure Communication Protocol without Explicit Key Exchange. In: Felber, P., Garg, V. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2014. Lecture Notes in Computer Science, vol 8756. Springer, Cham. https://doi.org/10.1007/978-3-319-11764-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11764-5_19

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11763-8

  • Online ISBN: 978-3-319-11764-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics