Abstract
The extreme asymmetry of passive backscatter communications systems such as passive Wi-Fi, while allowing significant reduction of node power consumption for communications, imposes severe resource limitations on implementing secure communications. Target applications for this technology are typically driven by the promise of low power consumption, up to four orders of magnitude lower than commercial Wi-Fi chipsets. Industry standard security approaches using encryption technology are problematic in this power regime, particularly as the potential low complexity and size of passive nodes will encourage application to high-density networks of very small, energy-poor devices. Generation of shared symmetric keys through reciprocal channel measurements, for example of received signal strength (RSS), is a natural approach in this situation. However previous work in this area has focused on the symmetric case where base station and nodes communicate at the same radio frequency. Backscatter communications uses two frequencies, typically a pilot beacon transmitted by a base station on one frequency, and response on a shifted frequency. This paper describes a protocol for RSS-based shared key generation for this architecture and reports the results of an experimental implementation using software radio emulation of backscatter communication.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kellogg, B., Parks, A., Gollakota, S., Smith, J.R., Wetherall, D.: Wi-fi backscatter: internet connectivity for RF-powered devices. ACM SIGCOMM Comput. Commun. Rev. 44(4), 607–618 (2015)
Ensworth, J.F., Reynolds, M.S.: Every smart phone is a backscatter reader: modulated backscatter compatibility with Bluetooth 4.0 Low Energy (BLE) devices. In: 2015 IEEE International Conference on RFID (RFID), pp. 78–85. IEEE (2015)
Bharadia, D., Joshi, K.R., Kotaru, M., Katti, S.: BackFi: high throughput WiFi backscatter. ACM SIGCOMM Comput. Commun. Rev. 45(4), 283–296 (2015)
Kellogg, B., Talla, V., Gollakota, S., Smith, J.R.: Passive Wi-Fi: bringing low power to Wi-Fi transmissions. In: 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2016), pp. 151–164 (2016)
Iyer, V., Talla, V., Kellogg, B., Gollakota, S., Smith, J.: Inter-technology backscatter: towards internet connectivity for implanted devices. In: Proceedings of the 2016 Conference on ACM SIGCOMM 2016 Conference, pp. 356–369. ACM (2016)
Zhang, P., Bharadia, D., Joshi, K.R., Katti, S.: HitchHike: practical backscatter using commodity WiFi. In: SenSys, pp. 259–271 (2016)
Wang, T., Liu, Y., Vasilakos, A.V.: Survey on channel reciprocity based key establishment techniques for wireless systems. Wirel. Netw. 21(6), 1835–1846 (2015)
Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)
Premnath, S.N., et al.: Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, pp. 321–332. ACM (2009)
Patwari, N., Croft, J., Jana, S., Kasera, S.K.: High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mob. Comput. 9(1), 17–30 (2010)
Ali, S.T., Sivaraman, V., Ostry, D.: Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Trans. Mob. Comput. 13(12), 2763–2776 (2014)
Chinaei, M.H., Sivaraman, V., Ostry, D.: An experimental study of secret key generation for passive wi-fi wearable devices. In: IEEE 18th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9. IEEE (2017)
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 128–139. ACM (2008)
Acknowledgements
The authors would like to thank Prof. Sherman Chow and the anonymous reviewers, whose valuable suggestions greatly improved the manuscript. We also would like to express our very great appreciation to Ms Samira Saadatpour for her valuable technical assistance in experimental implementations.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Chinaei, M.H., Ostry, D., Sivaraman, V. (2018). A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems. In: Capkun, S., Chow, S. (eds) Cryptology and Network Security. CANS 2017. Lecture Notes in Computer Science(), vol 11261. Springer, Cham. https://doi.org/10.1007/978-3-030-02641-7_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-02641-7_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02640-0
Online ISBN: 978-3-030-02641-7
eBook Packages: Computer ScienceComputer Science (R0)