Affiliation:
1. University of Wisconsin-Madison, Madison, Wisconsin, USA
2. Loyola University Chicago, Chicago, Illinois, USA
Abstract
The explosive proliferation of Internet-of-Things (IoT) ecosystem fuels the needs for a mechanism for the user to easily and securely interconnect multiple heterogeneous devices with minimal involvement. However, the current paradigm of context-unaware pairing and authentication methods (e.g., using a preset or user-defined password) poses severe challenges in the usability and security aspects due to the limited and siloed user interface that requires substantial effort on establishing or maintaining a secure network. In this paper, we present VoltKey, a method that transparently and continuously generates secret keys for colocated devices, leveraging spatiotemporally unique noise contexts observed in commercial power line infrastructure. We introduce a novel scheme to extract randomness from power line noise and securely convert it into the same key by a pair of devices. The unique noise pattern observed only by trusted devices connected to a local power line prevents malicious devices without physical access from obtaining unauthorized access to the network. VoltKey can be implemented on top of standard USB power supplies as a platform-agnostic bolt-on addition to any IoT devices or wireless access points that are constantly connected to the power outlet. Through extensive experiments under various realistic deployment environments, we demonstrate that VoltKey can successfully establish a secret key among colocated devices with over 90% success rate, while effectively rejecting malicious devices that do not have access to the local power line (but may have access to a spatially nearby line).
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Hardware and Architecture,Human-Computer Interaction
Reference33 articles.
1. Lawrence E. Bassham III Andrew L. Rukhin Juan Soto James R. Nechvatal Miles E. Smid Elaine B. Barker Stefan D. Leigh Mark Levenson Mark Vangel David L. Banks Nathanael Alan Heckert James F. Dray and San Vo. 2010. SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. Gaithersburg MD United States. Lawrence E. Bassham III Andrew L. Rukhin Juan Soto James R. Nechvatal Miles E. Smid Elaine B. Barker Stefan D. Leigh Mark Levenson Mark Vangel David L. Banks Nathanael Alan Heckert James F. Dray and San Vo. 2010. SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. Gaithersburg MD United States.
2. Taha Belkhouja Xiaojiang Du Amr Mohamed Abdulla K. Al-Ali and Mohsen Guizani. 2019. Biometric-based Authentication Scheme for Implantable Medical Devices during Emergency Situations. Future Generation Computer Systems 98 (September 2019) 109--119. Taha Belkhouja Xiaojiang Du Amr Mohamed Abdulla K. Al-Ali and Mohsen Guizani. 2019. Biometric-based Authentication Scheme for Implantable Medical Devices during Emergency Situations. Future Generation Computer Systems 98 (September 2019) 109--119.
3. Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks
4. Amplitude, width, and interarrival distributions for noise impulses on intrabuilding power line communication networks
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things;2024 IEEE Workshop on Design Automation for CPS and IoT (DESTION);2024-05-13
2. Physical Layer Security for L-Band Digital Aeronautical Communication System with Interference Mitigation;Electronics;2023-11-10
3. Secure and Successful Transmission Probability Analysis for PLC Networks;2023 International Symposium on Networks, Computers and Communications (ISNCC);2023-10-23
4. TouchKey;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2023-06-12
5. Secret Key Generation in Sensor Networks;Encyclopedia of Cryptography, Security and Privacy;2022-12-01