VoltKey

Author:

Lee Kyuin1,Klingensmith Neil2,Banerjee Suman1,Kim Younghyun1

Affiliation:

1. University of Wisconsin-Madison, Madison, Wisconsin, USA

2. Loyola University Chicago, Chicago, Illinois, USA

Abstract

The explosive proliferation of Internet-of-Things (IoT) ecosystem fuels the needs for a mechanism for the user to easily and securely interconnect multiple heterogeneous devices with minimal involvement. However, the current paradigm of context-unaware pairing and authentication methods (e.g., using a preset or user-defined password) poses severe challenges in the usability and security aspects due to the limited and siloed user interface that requires substantial effort on establishing or maintaining a secure network. In this paper, we present VoltKey, a method that transparently and continuously generates secret keys for colocated devices, leveraging spatiotemporally unique noise contexts observed in commercial power line infrastructure. We introduce a novel scheme to extract randomness from power line noise and securely convert it into the same key by a pair of devices. The unique noise pattern observed only by trusted devices connected to a local power line prevents malicious devices without physical access from obtaining unauthorized access to the network. VoltKey can be implemented on top of standard USB power supplies as a platform-agnostic bolt-on addition to any IoT devices or wireless access points that are constantly connected to the power outlet. Through extensive experiments under various realistic deployment environments, we demonstrate that VoltKey can successfully establish a secret key among colocated devices with over 90% success rate, while effectively rejecting malicious devices that do not have access to the local power line (but may have access to a spatially nearby line).

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction

Reference33 articles.

1. Lawrence E. Bassham III Andrew L. Rukhin Juan Soto James R. Nechvatal Miles E. Smid Elaine B. Barker Stefan D. Leigh Mark Levenson Mark Vangel David L. Banks Nathanael Alan Heckert James F. Dray and San Vo. 2010. SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. Gaithersburg MD United States. Lawrence E. Bassham III Andrew L. Rukhin Juan Soto James R. Nechvatal Miles E. Smid Elaine B. Barker Stefan D. Leigh Mark Levenson Mark Vangel David L. Banks Nathanael Alan Heckert James F. Dray and San Vo. 2010. SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. Gaithersburg MD United States.

2. Taha Belkhouja Xiaojiang Du Amr Mohamed Abdulla K. Al-Ali and Mohsen Guizani. 2019. Biometric-based Authentication Scheme for Implantable Medical Devices during Emergency Situations. Future Generation Computer Systems 98 (September 2019) 109--119. Taha Belkhouja Xiaojiang Du Amr Mohamed Abdulla K. Al-Ali and Mohsen Guizani. 2019. Biometric-based Authentication Scheme for Implantable Medical Devices during Emergency Situations. Future Generation Computer Systems 98 (September 2019) 109--119.

3. Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks

4. Amplitude, width, and interarrival distributions for noise impulses on intrabuilding power line communication networks

Cited by 13 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things;2024 IEEE Workshop on Design Automation for CPS and IoT (DESTION);2024-05-13

2. Physical Layer Security for L-Band Digital Aeronautical Communication System with Interference Mitigation;Electronics;2023-11-10

3. Secure and Successful Transmission Probability Analysis for PLC Networks;2023 International Symposium on Networks, Computers and Communications (ISNCC);2023-10-23

4. TouchKey;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2023-06-12

5. Secret Key Generation in Sensor Networks;Encyclopedia of Cryptography, Security and Privacy;2022-12-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3