ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi devices Using Physical Layer Security

03/11/2021
by   Khan Reaz, et al.
0

Secure and scalable device provisioning is a notorious challenge in Wi-Fi. WPA2/WPA3 solutions take user interaction and a strong passphrase for granted. However, the often weak passphrases are subject to guessing attacks. Notably, there has been a significant rise of cyberattacks on Wi-Fi home or small office networks during the COVID-19 pandemic. This paper addresses the device provisioning problem in Wi-Fi (personal mode) and proposes ComPass protocol to supplement WPA2/WPA3. ComPass replaces the pre-installed or user-selected passphrases with automatically generated ones. For this, ComPass employs Physical Layer Security and extracts credentials from common random physical layer parameters between devices. Two major features make ComPass unique and superior compared to previous proposals: First, it employs phase information (rather than amplitude or signal strength) to generate the passphrase so that it is robust, scaleable, and impossible to guess. Our analysis showed that ComPass generated passphrases have 3 times more entropy than human generated passphrases (113-bits vs. 34-bits). Second, ComPass selects parameters such that two devices bind only within a certain proximity (less than 3m), hence providing practically useful in-build PLS-based authentiation. ComPass is available as a kernel module or as full firmware.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/02/2021

Personal Devices for Contact Tracing: Smartphones and Wearables to Fight Covid-19

Digital contact tracing has emerged as a viable tool supplementing manua...
research
02/09/2022

MapiFi: Using Wi-Fi Signals to Map Home Devices

Imagine a map of your home with all of your connected devices (computers...
research
02/22/2021

InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

Secure Device-to-Device (D2D) communication is becoming increasingly imp...
research
07/29/2019

Transient Response of Hybrid Boolean Networks as Physical Unclonable Functions

Physical unclonable functions are devices that exploit small, random var...
research
10/16/2018

Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks (Extended Version)

Efficient key management for automotive networks (CAN) is a critical ele...
research
10/01/2018

Stronger Cryptography For Every Device, Everywhere

Generating secure random numbers is a central problem in cryptography th...

Please sign up or login with your details

Forgot password? Click here to reset