Secure Wireless Communication with Dynamic Secrets

Download Report

Transcript Secure Wireless Communication with Dynamic Secrets

Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom
Outline
Problem statement
 Overview
 Dynamic secrets

 Extraction
 Collection
 Amplification
System secret protection
 Bootstrapping security and implementation
 Summary and conclusion

Problem statement

Data security in wireless communication

Security mechanism desirable in the
case of secret leakage

Solution: use dynamic secrets, based on
the link layer communications between
wireless devices
Related Work

Prior work uses the wireless physical
channel properties for secret sharing

However, they usually demand special
hardware upgrades or at least specific
interfaces to provide channel measurement
information.
Related Work
Instead of working with the physical layer
channel model to calculate the secret
capacity, we shift attention to the link layer
and emphasize the dynamics of secrets.
 In wireless communication, it is practically
impossible to eavesdrop link layer
communication for a long period without
errors
 The single-point of failure occurs at the
attackers

Outline
Problem statement
 Overview
 Dynamic secrets

 Extraction
 Collection
 Amplification
System secret protection
 Bootstrapping security and implementation
 Summary and conclusion

Series of Dynamic Secrets
Let Hk indicates how many bits the adversary
needs to guess about the key. When Hk = 0,
the adversary knows the key explicitly and
the communication is not secure.
 Solution: Use a series of dynamic secrets, i.e.,
updates between t0 and t1


Rationale: Secrecy replenished as the
attacker cannot constantly overhear perfectly
Secret Safety Model
No dynamic secrets
Dynamic secrets, i.e.,
Advantage of Dynamic Secret

Information loss is not recoverable by any
computational effort

Information loss can be accumulated
Outline
Problem statement
 Overview
 Dynamic secrets

 Extraction
 Collection
 Amplification
System secret protection
 Bootstrapping security and implementation
 Summary and conclusion

Extracting Dynamic Secrets

Key ideas
 Monitor retransmissions
 Sender and receiver agree on set of frames
 Hash such frames into dynamic secrets

One Time Frame (OTF) is refers to a
frame that is only aired once and
correctly received.
AET Algorithms
Example: Stop-n-Wait
Collecting Dynamic Secrets

Maintain a set of frames ψ

Initially ψs = ψr = Ø

Remarks
 ψs and ψr differ of at most 1 frame
 The reception of a new frame ensures ψs = ψr
Collecting Dynamic Secrets

Maintain a set of frames ψ

Initially ψs = ψr = Ø

Remarks
 ψs and ψr differ of at most 1 frame
 The reception of a new frame ensures ψs = ψr
ψ
Amplifying Attacker’s Entropy
Goal: Increase attacker’s uncertainty
 Input: ψ set
 Output: A secret S with high entropy


Denoted as
S = F(ψ)
Amplifying Attacker’s Entropy

Random hashing theory
 uniform-randomly choosing a function from a
universal-2 hashing class

The expected hash output distribution will be
close to the uniform distribution when the output
is sufficiently short
[1] - J.L. Carter and M. N. Wegman. Universal classes of hash functions.
Journal of Computer and System Sciences, 18:396-407, 1979
Amplifying Attacker’s Entropy

Entropy amplification
If
 If

 Attacker has < 1 bit info about S
 Uncertainty bounded by ϵ - 1
[2] – Alfred Rényi. On measures of information and entropy. In Proceedings of
the 4° Berkeley Symposium on Mathematics, Statistics and Probability, 1960
Dynamic Secret Generation

The above discussion justifies the use of the
following method
 Collect OTFs until | ψ | > nts
 Agree on a randomly chosen universal-2 hash
function F
 Generate S(t) = F(ψ)
 Reset ψ = Ø
Outline
Problem statement
 Overview
 Dynamic secrets

 Extraction
 Collection
 Amplification
System secret protection
 Bootstrapping security and implementation
 Summary and conclusion

System Secret Protection

At secret generation
 Divide s(t) = u(t) || v(t)
 To protect the private public key pair and secret
symmetric key respectively
Remark: information loss will accumulate
 Entropy is non decreasing

System Secret Protection
Outline
Problem statement
 Overview
 Dynamic secrets

 Extraction
 Collection
 Amplification
System secret protection
 Bootstrapping security and implementation
 Summary and conclusion

Bootstrapping Security
Scenario: Use time to invest in security
 Solution: the sender transmits random
data at first to build up security

Prototype Implementation

802.11g
Extracting
dynamic secrets
at receiver
Hash
Extracting dynamic
secrets at sender
Outline
Problem statement
 Overview
 Dynamic secrets

 Extraction
 Collection
 Amplification
System secret protection
 Bootstrapping security and implementation
 Summary and conclusion

Summary and conclusion

Our work strengthens security in the
case of secrecy leakages by using
dynamic secrets

For future work, use prototype for
experimental evaluation