skip to main content
10.1145/2976749.2978298acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Instant and Robust Authentication and Key Agreement among Mobile Devices

Published: 24 October 2016 Publication History

Abstract

Device-to-device communication is important to emerging mobile applications such as Internet of Things and mobile social networks. Authentication and key agreement among multiple legitimate devices is the important first step to build a secure communication channel. Existing solutions put the devices into physical proximity and use the common radio environment as a proof of identities and the common secret to agree on a same key. However they experience very slow secret bit generation rate and high errors, requiring several minutes to build a 256-bit key. In this work, we design and implement an authentication and key agreement protocol for mobile devices, called The Dancing Signals (TDS), being extremely fast and error-free. TDS uses channel state information (CSI) as the common secret among legitimate devices. It guarantees that only devices in a close physical proximity can agree on a key and any device outside a certain distance gets nothing about the key. Compared with existing solutions, TDS is very fast and robust, supports group key agreement, and can effectively defend against predictable channel attacks. We implement TDS using commodity off-the-shelf 802.11n devices and evaluate its performance via extensive experiments. Results show that TDS only takes a couple of seconds to make devices agree on a 256-bit secret key with high entropy.

References

[1]
K. Argyraki, S. Diggavi, M. Duarte, C. Fragouli, M. Gatzianas, and P. Kostopoulos. Creating secrets out of erasures. In Proceedings of ACM MobiCom, 2013.
[2]
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In Proceedings of ACM CCS, 2007.
[3]
G. Brassard and L. Salvail. Secret-key reconciliation by public discussion. In Proceedings of Advances in Cryptology-EUROCRYPT, 1994.
[4]
N. Cheng, X. Oscar Wang, W. Cheng, P. Mohapatra, and A. Seneviratne. Characterizing privacy leakage of public WiFi networks for users on travel. In Proceedings of IEEE INFOCOM, pages 2769--2777. IEEE, 2013.
[5]
J. Croft, N. Patwari, and S. K. Kasera. Robust uncorrelated bit extraction methodologies for wireless sensors. In Proceedings of ACM/IEEE IPSN, pages 70--81. ACM, 2010.
[6]
W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 1976.
[7]
S. Gollakota and D. Katabi. Physical layer wireless security made fast and channel independent. In Proceedings IEEE of INFOCOM, pages 1125--1133. IEEE, 2011.
[8]
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of ACM MobiCom, 2009.
[9]
D. Kalman. A singularly valuable decomposition: the SVD of a matrix. The college mathematics journal, 27(1):2--23, 1996.
[10]
H. W. Kuhn. The Hungarian Method for the Assignment Problem. Naval Research Logistics, 52(1):7--21, 2005.
[11]
L. Lai, Y. Liang, and H. V. Poor. A unified framework for key agreement over wireless fading channels. IEEE Transactions on Information Forensics and Security, 7(2):480--490, 2012.
[12]
H. Liu, Y. Wang, J. Yang, and Y. Chen. Fast and practical secret key extraction by exploiting channel response. In Proceedings of IEEE INFOCOM, 2013.
[13]
H. Liu, J. Yang, Y. Wang, and Y. Chen. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In Proceedings of IEEE INFOCOM, pages 927--935. IEEE, 2012.
[14]
Y. Liu, S. C. Draper, and A. M. Sayeed. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Transactions on Information Forensics and Security, 7(5):1484--1497, 2012.
[15]
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam. Proximate: proximity-based secure pairing using ambient wireless signals. In Proceedings of ACM MobiSys, pages 211--224. ACM, 2011.
[16]
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of ACM MobiCom, pages 128--139. ACM, 2008.
[17]
U. M. Maurer and S. Wolf. Secret-Key Agreement Over Unauthenticated Public Channels-Part III: Privacy Amplification. IEEE Transactions on Information Theory, 2003.
[18]
R. Mehmood, J. W. Wallace, M. Jensen, et al. Key establishment employing reconfigurable antennas: Impact of antenna complexity. IEEE Transactions on Wireless Communications, 13(11):6300--6310, 2014.
[19]
M. Miettinen, N. Asokan, T. D. Nguyen, A. Sadeghi, and M. Sobhani. Context-based zero-interaction pairing and key evolution for advanced personal devices. In Proceedings of ACM CCS. ACM, 2014.
[20]
N. Patwari, J. Croft, S. Jana, and S. K. Kasera. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing, 9(1):17--30, 2010.
[21]
K. Ren, H. Su, and Q. Wang. Secret key generation exploiting channel characteristics in wireless communications. IEEE Wireless Communications, 18(4):6--12, 2011.
[22]
R. Renner and S. Wolf. Simple and tight bounds for information reconciliation and privacy amplification. In Proceedings of ASIACRYPT, 2005.
[23]
Z. Sun, A. Purohit, R. Bose, and P. Zheng. Spartacus: Spatially-aware interaction for mobile devices through energy-efficient audio sensing. In Proceedings of ACM MobiSys, 2013.
[24]
A. Varshavsky, A. Scannell, A. LaMarca, and E. de Lara. Amigo: Proximity-based authentication of mobile devices. In Proceedings of UbiComp, 2007.
[25]
Q. Wang, H. Su, K. Ren, and K. Kim. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of IEEE INFOCOM, pages 1422--1430. IEEE, 2011.
[26]
Q. Wang, K. Xu, and K. Ren. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels. IEEE Journal on Selected Areas in Communications, 30(9):1666 -- 1674, 2011.
[27]
T. Wang, Y. Liu, Q. Pei, and T. Hou. Location-restricted services access control leveraging pinpoint waveforming. In ACM Sigsac Conference on Computer and Communications Security, pages 292--303, 2015.
[28]
W. Xi, X.-Y. Li, C. Qian, J. Han, S. Tang, J. Zhao, and K. Zhao. KEEP: Fast Secret Key Extraction Protocol for D2D Communication.
[29]
S. Xiao, W. Gong, and D. Towsley. Secure wireless communication with dynamic secrets. In Proceedings of IEEE INFOCOM, pages 1--9. IEEE, 2010.

Cited By

View all
  • (2025)Efficient and Error-Free Secret Key Generation Leveraging Sorted Indices MatchingIEEE Transactions on Mobile Computing10.1109/TMC.2024.346504224:2(779-793)Online publication date: 1-Feb-2025
  • (2024)InaudibleKey2.0: Deep Learning-Empowered Mobile Device Pairing Protocol Based on Inaudible Acoustic SignalsIEEE/ACM Transactions on Networking10.1109/TNET.2024.340778332:5(4160-4174)Online publication date: Oct-2024
  • (2024)Covert Communication With Acoustic NoiseIEEE/ACM Transactions on Networking10.1109/TNET.2023.328669232:1(207-221)Online publication date: Feb-2024
  • Show More Cited By

Index Terms

  1. Instant and Robust Authentication and Key Agreement among Mobile Devices

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
      October 2016
      1924 pages
      ISBN:9781450341394
      DOI:10.1145/2976749
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 24 October 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. CSI
      2. group authentication
      3. key agreement
      4. wifi

      Qualifiers

      • Research-article

      Conference

      CCS'16
      Sponsor:

      Acceptance Rates

      CCS '16 Paper Acceptance Rate 137 of 831 submissions, 16%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)51
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 02 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Efficient and Error-Free Secret Key Generation Leveraging Sorted Indices MatchingIEEE Transactions on Mobile Computing10.1109/TMC.2024.346504224:2(779-793)Online publication date: 1-Feb-2025
      • (2024)InaudibleKey2.0: Deep Learning-Empowered Mobile Device Pairing Protocol Based on Inaudible Acoustic SignalsIEEE/ACM Transactions on Networking10.1109/TNET.2024.340778332:5(4160-4174)Online publication date: Oct-2024
      • (2024)Covert Communication With Acoustic NoiseIEEE/ACM Transactions on Networking10.1109/TNET.2023.328669232:1(207-221)Online publication date: Feb-2024
      • (2024)FaceFinger: Embracing Variance for Heartbeat Based Symmetric Key Generation SystemIEEE Transactions on Mobile Computing10.1109/TMC.2024.344026323:12(14218-14232)Online publication date: Dec-2024
      • (2024)Scenario-Adaptive Key Establishment Scheme for LoRa-Enabled IoV CommunicationsIEEE Transactions on Mobile Computing10.1109/TMC.2024.342165923:12(12998-13014)Online publication date: Dec-2024
      • (2024)Secure and Controllable Secret Key Generation Through CSI Obfuscation Matrix EncapsulationIEEE Transactions on Mobile Computing10.1109/TMC.2024.340706223:12(12313-12329)Online publication date: 1-Dec-2024
      • (2024)Secret Key Generation Based on Manipulated Channel Measurement MatchingIEEE Transactions on Mobile Computing10.1109/TMC.2024.336490923:10(9532-9548)Online publication date: 1-Oct-2024
      • (2024)Physical Layer Secret Key Generation Leveraging Proactive Pilot Contamination2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS60910.2024.00120(1272-1282)Online publication date: 23-Jul-2024
      • (2024)Secret Key Generation with Adaptive Pilot Manipulation for Matching-Based MethodICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10622605(2688-2693)Online publication date: 9-Jun-2024
      • (2024)A Survey on Human Profile Information Inference via Wireless SignalsIEEE Communications Surveys & Tutorials10.1109/COMST.2024.337339726:4(2577-2610)Online publication date: Dec-2025
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media