Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures

09/29/2018
by   Rui Zhu, et al.
0

The formal theoretical analysis on channel correlations in both real indoor and outdoor environments are provided in this paper. Moreover, this paper studies empirical statistical inference attacks (SIA) against LSB key extraction, whereby an adversary infers the signature of a target link. Consequently, the secret key extracted from that signature has been recovered by observing the surrounding links. Prior work assumes theoretical link-correlation models for the inference, in contrast, our study does not make any assumption on link correlation. Instead, we take machine learning (ML) methods for link inference based on empirically measured link signatures. ML algorithms have been developed to launch SIAs under various realistic scenarios. Our experimental results have shown that the proposed inference algorithms are still quite effective even without making assumptions on link correlation. In addition, our inference algorithms can reduce the key search space by many orders of magnitudes compared to brute force search. We further propose a countermeasure against the statistical inference attacks, FBCH (forward-backward cooperative key extraction protocol with helpers). In the FBCH, helpers (other trusted wireless nodes) are introduced to provide more randomness in the key extraction. Our experiment results verify the effectiveness of the proposed protocol.

READ FULL TEXT
research
11/18/2022

Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks

Machine learning (ML) models have been deployed for high-stakes applicat...
research
09/14/2021

Statistical Inference: The Missing Piece of RecSys Experiment Reliability Discourse

This paper calls attention to the missing component of the recommender s...
research
06/04/2018

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models

Machine learning (ML) has become a core component of many real-world app...
research
06/04/2021

Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization

Physical-layer based key generation schemes exploit the channel reciproc...
research
07/14/2020

Lattice Blind Signatures with Forward Security

Blind signatures play an important role in both electronic cash and elec...
research
01/28/2019

Diffie-Hellman in the Air: A Link Layer Approach for In-Band Wireless Pairing

Key establishment is one fundamental issue in wireless security. The wid...
research
11/18/2017

Automatic link extraction: The good, the bad and the ugly in software ecosystem mining

This abstract presents the automatic link extraction pitfalls based on o...

Please sign up or login with your details

Forgot password? Click here to reset