TY - GEN
T1 - AmbiSec
T2 - 1st International Joint Conference on Ambient Intelligence, AmI 2010
AU - Barsocchi, Paolo
AU - Chessa, Stefano
AU - Martinovic, Ivan
AU - Oligeri, Gabriele
PY - 2010
Y1 - 2010
N2 - Following the vision of Ambient Intelligence (AmI), this paper introduces and evaluates a novel security scheme that takes the advantage of the unpredictable and erratic behavior of wireless communication to generate secret keys. The main advantage is that the secret key generation is applicable to every wireless device, independently of their hardware characteristics as it only requires a wireless interface and a human movement, which inherently affects the signal propagation within the physical environment. To analyze the applicability of this scheme, we implement and systematically evaluate the key generation using a wireless sensor network deployed in a real-world scenario. The analysis clarifies how different factors influence the amount of randomness collected from the physical environment, and it also shows that guessing attacks from an eavesdropper are negligible even if it is able to eavesdrop the complete wireless communication.
AB - Following the vision of Ambient Intelligence (AmI), this paper introduces and evaluates a novel security scheme that takes the advantage of the unpredictable and erratic behavior of wireless communication to generate secret keys. The main advantage is that the secret key generation is applicable to every wireless device, independently of their hardware characteristics as it only requires a wireless interface and a human movement, which inherently affects the signal propagation within the physical environment. To analyze the applicability of this scheme, we implement and systematically evaluate the key generation using a wireless sensor network deployed in a real-world scenario. The analysis clarifies how different factors influence the amount of randomness collected from the physical environment, and it also shows that guessing attacks from an eavesdropper are negligible even if it is able to eavesdrop the complete wireless communication.
UR - https://www.scopus.com/pages/publications/78649516322
U2 - 10.1007/978-3-642-16917-5_8
DO - 10.1007/978-3-642-16917-5_8
M3 - Conference contribution
AN - SCOPUS:78649516322
SN - 3642169163
SN - 9783642169168
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 73
EP - 85
BT - Ambient Intelligence - First International Joint Conference, AmI 2010, Proceedings
Y2 - 10 November 2010 through 12 November 2010
ER -