Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation

03/26/2020
by   Miroslav Mitev, et al.
0

Wireless secret key generation (W-SKG) from shared randomness (e.g., from the wireless channel fading realizations), is a well established scheme that can be used for session key agreement. W-SKG approaches can be of particular interest in delay constrained wireless networks and notably in the context of ultra reliable low latency communications (URLLC) in beyond fifth generation (B5G) systems. However, W-SKG schemes are known to be malleable over the so called "advantage distillation" phase, during which observations of the shared randomness are obtained at the legitimate parties. As an example, an active attacker can act as a man-in-the-middle (MiM) by injecting pilot signals and/or can mount denial of service attacks (DoS) in the form of jamming. This paper investigates the impact of injection and reactive jamming attacks in W-SKG. First, it is demonstrated that injection attacks can be reduced to - potentially less harmful - jamming attacks by pilot randomization; a novel system design with randomized QPSK pilots is presented. Subsequently, the optimal jamming strategy is identified in a block fading additive white Gaussian noise (BF-AWGN) channel in the presence of a reactive jammer, using a game theoretic formulation. It is shown that the impact of a reactive jammer is far more severe than that of a simple proactive jammer

READ FULL TEXT
research
02/01/2021

Common Randomness Generation over Slow Fading Channels

This paper analyzes the problem of common randomness (CR) generation fro...
research
09/13/2023

Reliability-Latency-Rate Tradeoff in Low-Latency Communications with Finite-Blocklength Coding

Low-latency communication plays an increasingly important role in delay-...
research
02/28/2023

Robust one-shot estimation over shared networks in the presence of denial-of-service attacks

Multi-agent systems often communicate over low-power shared wireless net...
research
06/14/2021

How to Test the Randomness from the Wireless Channel for Security?

We revisit the traditional framework of wireless secret key generation, ...
research
06/04/2021

Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization

Physical-layer based key generation schemes exploit the channel reciproc...
research
04/01/2019

Defending against adversarial attacks by randomized diversification

The vulnerability of machine learning systems to adversarial attacks que...
research
11/30/2021

A Secure Key Sharing Algorithm Exploiting Phase Reciprocity in Wireless Channels

This article presents a secure key exchange algorithm that exploits reci...

Please sign up or login with your details

Forgot password? Click here to reset