About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
10th EAI International Conference on Body Area Networks

Research Article

Secret Key Generation by Virtual Link Estimation

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.28-9-2015.2261448,
        author={Chitra Javali and Girish Revadigar and Ming Ding and Sanjay Jha},
        title={Secret Key Generation by Virtual Link Estimation},
        proceedings={10th EAI International Conference on Body Area Networks},
        publisher={ACM},
        proceedings_a={BODYNETS},
        year={2015},
        month={12},
        keywords={body-to-body communication physical layer security secret key generation},
        doi={10.4108/eai.28-9-2015.2261448}
    }
    
  • Chitra Javali
    Girish Revadigar
    Ming Ding
    Sanjay Jha
    Year: 2015
    Secret Key Generation by Virtual Link Estimation
    BODYNETS
    ICST
    DOI: 10.4108/eai.28-9-2015.2261448
Chitra Javali1,*, Girish Revadigar1, Ming Ding2, Sanjay Jha3
  • 1: UNSW Australia and NICTA
  • 2: NICTA
  • 3: UNSW Australia
*Contact email: chitraj@cse.unsw.edu.au

Abstract

In recent years, researchers have explored using unique radio propagation characteristics between two devices for extracting symmetric keys. However, the state-of-the-art has the following limitations: (i) paying more attention to only when the two devices are in communication range, and (ii) generating keys only when the devices are in motion. Secret key generation for devices which are not in communication range and for stationary nodes is quite a challenging task. In this paper, we study the feasibility of generating secret keys between two devices which do not possess any direct link with the help of a trusted relay. We propose and implement our protocol using off-the-shelf commercially available resource constrained devices suitable for health-care applications which are a vital part of pervasive networks. We conduct an extensive set of experiments in an indoor environment for various scenarios involving stationary and mobile nodes. Our results show that the key generation rate increases by 20 times compared to the existing mechanisms using the same sampling frequency. We analyse the mutual information shared between the legitimate devices and eavesdroppers and our results reveal that, when at least any two of the three legitimate devices are mobile, an eavesdropper cannot obtain sufficient useful information to guess the shared keys.

Keywords
body-to-body communication physical layer security secret key generation
Published
2015-12-14
Publisher
ACM
http://dx.doi.org/10.4108/eai.28-9-2015.2261448
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL