Skip to main content

A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems

  • Conference paper
  • First Online:
  • 783 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11261))

Abstract

The extreme asymmetry of passive backscatter communications systems such as passive Wi-Fi, while allowing significant reduction of node power consumption for communications, imposes severe resource limitations on implementing secure communications. Target applications for this technology are typically driven by the promise of low power consumption, up to four orders of magnitude lower than commercial Wi-Fi chipsets. Industry standard security approaches using encryption technology are problematic in this power regime, particularly as the potential low complexity and size of passive nodes will encourage application to high-density networks of very small, energy-poor devices. Generation of shared symmetric keys through reciprocal channel measurements, for example of received signal strength (RSS), is a natural approach in this situation. However previous work in this area has focused on the symmetric case where base station and nodes communicate at the same radio frequency. Backscatter communications uses two frequencies, typically a pilot beacon transmitted by a base station on one frequency, and response on a shifted frequency. This paper describes a protocol for RSS-based shared key generation for this architecture and reports the results of an experimental implementation using software radio emulation of backscatter communication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kellogg, B., Parks, A., Gollakota, S., Smith, J.R., Wetherall, D.: Wi-fi backscatter: internet connectivity for RF-powered devices. ACM SIGCOMM Comput. Commun. Rev. 44(4), 607–618 (2015)

    Article  Google Scholar 

  2. Ensworth, J.F., Reynolds, M.S.: Every smart phone is a backscatter reader: modulated backscatter compatibility with Bluetooth 4.0 Low Energy (BLE) devices. In: 2015 IEEE International Conference on RFID (RFID), pp. 78–85. IEEE (2015)

    Google Scholar 

  3. Bharadia, D., Joshi, K.R., Kotaru, M., Katti, S.: BackFi: high throughput WiFi backscatter. ACM SIGCOMM Comput. Commun. Rev. 45(4), 283–296 (2015)

    Article  Google Scholar 

  4. Kellogg, B., Talla, V., Gollakota, S., Smith, J.R.: Passive Wi-Fi: bringing low power to Wi-Fi transmissions. In: 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016), pp. 151–164 (2016)

    Google Scholar 

  5. Iyer, V., Talla, V., Kellogg, B., Gollakota, S., Smith, J.: Inter-technology backscatter: towards internet connectivity for implanted devices. In: Proceedings of the 2016 Conference on ACM SIGCOMM 2016 Conference, pp. 356–369. ACM (2016)

    Google Scholar 

  6. Zhang, P., Bharadia, D., Joshi, K.R., Katti, S.: HitchHike: practical backscatter using commodity WiFi. In: SenSys, pp. 259–271 (2016)

    Google Scholar 

  7. Wang, T., Liu, Y., Vasilakos, A.V.: Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel. Netw. 21(6), 1835–1846 (2015)

    Article  Google Scholar 

  8. Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)

    Article  Google Scholar 

  9. Premnath, S.N., et al.: Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)

    Article  Google Scholar 

  10. Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, pp. 321–332. ACM (2009)

    Google Scholar 

  11. Patwari, N., Croft, J., Jana, S., Kasera, S.K.: High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mob. Comput. 9(1), 17–30 (2010)

    Article  Google Scholar 

  12. Ali, S.T., Sivaraman, V., Ostry, D.: Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Trans. Mob. Comput. 13(12), 2763–2776 (2014)

    Article  Google Scholar 

  13. Chinaei, M.H., Sivaraman, V., Ostry, D.: An experimental study of secret key generation for passive wi-fi wearable devices. In: IEEE 18th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9. IEEE (2017)

    Google Scholar 

  14. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 128–139. ACM (2008)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank Prof. Sherman Chow and the anonymous reviewers, whose valuable suggestions greatly improved the manuscript. We also would like to express our very great appreciation to Ms Samira Saadatpour for her valuable technical assistance in experimental implementations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Hossein Chinaei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chinaei, M.H., Ostry, D., Sivaraman, V. (2018). A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems. In: Capkun, S., Chow, S. (eds) Cryptology and Network Security. CANS 2017. Lecture Notes in Computer Science(), vol 11261. Springer, Cham. https://doi.org/10.1007/978-3-030-02641-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02641-7_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02640-0

  • Online ISBN: 978-3-030-02641-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics