POSTER: Authenticated secret key extraction using channel characteristics for Body Area Networks

Jiawei Yuan, Lu Shi, Shucheng Yu, Ming Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

Simultaneously realizing device authentication and fast secret key extraction is a challenging issue in wireless networks. Most existing works solve this problem by utilizing either advanced hardware or out-of-band channel, which is not always available for commercial-off-the-shelf wireless devices. In this work, we solve this challenging issue under the setting of Wireless Body Area Network (BAN) and propose a lightweight authenticated secret key extraction scheme, namely ASK-BAN. The proposed scheme is just based on wireless channel measurement and does not introduce any advanced hardware or rely on any out-of-band channel. Experimental results show that our proposed scheme can offer a high secret key extraction rate while providing effective device authentication simultaneously.

Original languageEnglish (US)
Title of host publicationCCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security
Pages1028-1030
Number of pages3
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 ACM Conference on Computer and Communications Security, CCS 2012 - Raleigh, NC, United States
Duration: Oct 16 2012Oct 18 2012

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference2012 ACM Conference on Computer and Communications Security, CCS 2012
Country/TerritoryUnited States
CityRaleigh, NC
Period10/16/1210/18/12

Keywords

  • Authenticated key generation
  • BAN
  • Physical layer
  • Sensor

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'POSTER: Authenticated secret key extraction using channel characteristics for Body Area Networks'. Together they form a unique fingerprint.

Cite this