Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation

被引:13
|
作者
Mitev, Miroslav [1 ]
Chorti, Arsenia [2 ]
Belmega, E. Veronica [2 ]
Reed, Martin [1 ]
机构
[1] Univ Essex, Sch CSEE, Colchester, Essex, England
[2] Univ Cergy Pontoise, Univ Paris Seine, CNRS, ETIS,ENSEA, Cergy Pontoise, France
基金
巴西圣保罗研究基金会;
关键词
Wireless secret key agreement; shared randomness; injection attack; man-in-the-middle; denial of service attack; jamming;
D O I
10.1109/globecom38437.2019.9013816
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless secret key generation (W-SKG) from shared randomness (e.g., from the wireless channel fading realizations), is a well established scheme that can be used for session key agreement. W-SKG approaches can be of particular interest in delay constrained wireless networks and notably in the context of ultra reliable low latency communications (URLLC) in beyond fifth generation (B5G) systems. However W-SKG schemes are known to be malleable over the so called "advantage distillation" phase, during which observations of the shared randomness are obtained at the legitimate parties. As an example, an active attacker can act as a man-in-the-middle (MiM) by injecting pilot signals and/or can mount denial of service attacks (DoS) in the form of jamming. This paper investigates the impact of injection and reactive jamming attacks in W-SKG. First, it is demonstrated that injection attacks can be reduced to - potentially less harmful - jamming attacks by pilot randomization; a novel system design with randomized QPSK pilots is presented. Subsequently, the optimal jamming strategy is identified in a block fading additive white Gaussian noise (BF-AWGN) channel in the presence of a reactive jammer, using a game theoretic formulation. It is shown that the impact of a reactive jammer is far more severe than that of a simple proactive jammer.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Man-in-the-middle and denial of service attacks in wireless secret key generation
    Mitev, Miroslav
    Chorti, Arsenia
    Belmega, E. Veronica
    Reed, Martin
    Proceedings - IEEE Global Communications Conference, GLOBECOM, 2019,
  • [2] Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks
    Letafati, Mehdi
    Behroozi, Hamid
    Khalaj, Babak Hossein
    Jorswieck, Eduard A.
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [3] Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries
    Letafati, Mehdi
    Behroozi, Hamid
    Khalaj, Babak Hossein
    Jorswieck, Eduard A.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (04) : 856 - 860
  • [4] Secret key generation based on private pilot under man-in-the-middle attack
    Huang, Yu
    Jin, Liang
    Li, Na
    Zhong, Zhou
    Xu, Xiaoming
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (10)
  • [5] Secret key generation based on private pilot under man-in-the-middle attack
    Yu Huang
    Liang Jin
    Na Li
    Zhou Zhong
    Xiaoming Xu
    Science China Information Sciences, 2017, 60
  • [6] Secret key generation based on private pilot under man-in-the-middle attack
    Yu HUANG
    Liang JIN
    Na LI
    Zhou ZHONG
    Xiaoming XU
    Science China(Information Sciences), 2017, 60 (10) : 93 - 106
  • [7] Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Li, Haitao
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 263 - +
  • [8] Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks
    Glass, Stephen
    Muthukkumurasamy, Vallipuram
    Portmann, Marius
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 530 - +
  • [9] IoT and Man-in-the-Middle Attacks
    Fereidouni, Hamidreza
    Fadeitcheva, Olga
    Zalai, Mehdi
    Security and Privacy, 2025, 8 (02)
  • [10] Impact of Man-In-The-Middle Attacks on Ethereum
    Ekparinya, Parinya
    Gramoli, Vincent
    Jourjon, Guillaume
    2018 IEEE 37TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2018, : 11 - 20