Upload
lynnea
View
33
Download
0
Tags:
Embed Size (px)
DESCRIPTION
“ Hello Bob, Alice ” ---Secure wireless communication with mutual link information ( a tutorial perspective ). Dr. Shaoen Wu School of Computing http://networks.cs.usm.edu [email protected]. Outline. Information Security 101 Wireless Channel Characteristics Wireless Physical Security. - PowerPoint PPT Presentation
Citation preview
“Hello Bob, Alice”---Secure wireless communication with
mutual link information(a tutorial perspective)
Dr. Shaoen WuSchool of Computing
http://networks.cs.usm.edu
04/22/23 2
Outline
• Information Security 101• Wireless Channel Characteristics• Wireless Physical Security
04/22/23 2
04/22/23 3
Outline
• Information Security 101• Wireless Channel Characteristics• Wireless Physical Security
04/22/23 3
04/22/23 4
Security Model
• Secrecy / Confidentiality
• Authentication / Integrity
04/22/23 5
Encryption
• Conventional Encryption (Shared Key Encryption,
Symmetric Encryption)
04/22/23 5
04/22/23 6
Encryption
• Public-Private Key Encryption (PKI, asymmetric
encryption)
04/22/23 6
04/22/23 7
Encryption
• Shared Key – Fast– Hard in key distribution
• PKI– Slow– Easy in key distribution
• But require infrastructure
04/22/23 8
Wireless Communication
04/22/23 8
Channel uncorrelated at different locations
04/22/23 9
Wireless Communication
04/22/23 9
Channel reciprocity
04/22/23 10
Wireless Signal Symbol
04/22/23 10
)()( wtjAety
Key Generation
• Metrics– Channel Response; Received Signal Strength,
Phase
• Goals (controversial)– fast– strong
04/22/23 11
Generation Procedures
• Probing / Sampling
• Quantization
• Information Reconciliation
• Privacy Amplification
04/22/23 12
Design Issues• Probing
– time duplex• Interpolation ---finite impulse response (FIR) fractional delay
filter
– Time selective– Frequency selective
• Sampling– Autocorrelation -- key strength– Frequency (open question)
04/22/23 13
Design Issues• Quantization
– More levels, more bits, but less agreement
• Information Reconciliation --- key agreement• hash (verification) + exhaustive search (correction)– Correction codes– interactive information reconciliation protocol
• Privacy Amplification– Leftover hash lemma04/22/23 14
04/22/23 15