150 likes | 297 Views
“ Hello Bob, Alice ” ---Secure wireless communication with mutual link information ( a tutorial perspective ). Dr. Shaoen Wu School of Computing http://networks.cs.usm.edu Shaoen.wu@usm.edu. Outline. Information Security 101 Wireless Channel Characteristics Wireless Physical Security.
E N D
“Hello Bob, Alice”---Secure wireless communication with mutual link information(a tutorial perspective) Dr. Shaoen Wu School of Computing http://networks.cs.usm.edu Shaoen.wu@usm.edu
Outline Information Security 101 Wireless Channel Characteristics Wireless Physical Security 8/21/2014 2
Outline Information Security 101 Wireless Channel Characteristics Wireless Physical Security 8/21/2014 3
Security Model • Secrecy / Confidentiality • Authentication / Integrity
Encryption Conventional Encryption (Shared Key Encryption, Symmetric Encryption) 8/21/2014 5
Encryption • Public-Private Key Encryption (PKI, asymmetric encryption) 8/21/2014 6
Encryption • Shared Key • Fast • Hard in key distribution • PKI • Slow • Easy in key distribution • But require infrastructure
Wireless Communication Channeluncorrelated at different locations 8/21/2014 8
Wireless Communication Channel reciprocity 8/21/2014 9
Wireless Signal Symbol 8/21/2014 10
KeyGeneration • Metrics • ChannelResponse;Received SignalStrength, Phase • Goals (controversial) • fast • strong
Generation Procedures • Probing / Sampling • Quantization • Information Reconciliation • Privacy Amplification
Design Issues • Probing • time duplex • Interpolation ---finite impulse response (FIR) fractional delay filter • Time selective • Frequency selective • Sampling • Autocorrelation -- key strength • Frequency (open question)
Design Issues • Quantization • More levels, more bits, but less agreement • Information Reconciliation --- key agreement • hash (verification) + exhaustive search (correction) • Correction codes • interactive information reconciliation protocol • Privacy Amplification • Leftover hash lemma