AmbiSec: Securing smart spaces using entropy harvesting

Paolo Barsocchi*, Stefano Chessa, Ivan Martinovic, Gabriele Oligeri

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Following the vision of Ambient Intelligence (AmI), this paper introduces and evaluates a novel security scheme that takes the advantage of the unpredictable and erratic behavior of wireless communication to generate secret keys. The main advantage is that the secret key generation is applicable to every wireless device, independently of their hardware characteristics as it only requires a wireless interface and a human movement, which inherently affects the signal propagation within the physical environment. To analyze the applicability of this scheme, we implement and systematically evaluate the key generation using a wireless sensor network deployed in a real-world scenario. The analysis clarifies how different factors influence the amount of randomness collected from the physical environment, and it also shows that guessing attacks from an eavesdropper are negligible even if it is able to eavesdrop the complete wireless communication.

Original languageEnglish
Title of host publicationAmbient Intelligence - First International Joint Conference, AmI 2010, Proceedings
Pages73-85
Number of pages13
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event1st International Joint Conference on Ambient Intelligence, AmI 2010 - Malaga, Spain
Duration: 10 Nov 201012 Nov 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6439 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Joint Conference on Ambient Intelligence, AmI 2010
Country/TerritorySpain
CityMalaga
Period10/11/1012/11/10

Fingerprint

Dive into the research topics of 'AmbiSec: Securing smart spaces using entropy harvesting'. Together they form a unique fingerprint.

Cite this