TY - JOUR
T1 - Kerra
T2 - An Internet of Things Wireless Key Generation Resistant to Replay Attacks
AU - Huan, Xintao
AU - Miao, Kaitao
AU - Chen, Wen
AU - Jia, Pengyi
AU - Hu, Han
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2024
Y1 - 2024
N2 - Wireless key generation is a promising security solution for Internet of Things (IoT) networks to share identical secret keys between communication pairs, whose foundation is wireless channel randomness and reciprocity. Its security, however, affects not only the generated keys but more importantly, the security of the IoT networks. So far, a number of major attacks threatening the wireless key generation have been studied in the literature, but not the replay attack. In this article, we reveal the replay attack can penetrate conventional defense measures and invade the wireless key generation through both analysis and experiments, which can deteriorate the channel measurement correlation and result in a high key disagreement rate (KDR). We propose a wireless key generation approach named Kerra where we integrate a synchronized time measurement to defend against the replay attack on it. On a real IoT testbed composed of long-range (LoRa) nodes, we implement the proposed Kerra and evaluate it in terms of both key generation performance and replay attack defense. Experimental results demonstrate first the impact of the replay attack on both channel measurement correlation and KDR, then the effects of quantization and preprocessing on KDR under replay attacks, and finally, the effectiveness of the proposed Kerra whose KDRs under replay attacks are maintained to a similar level as without attacks.
AB - Wireless key generation is a promising security solution for Internet of Things (IoT) networks to share identical secret keys between communication pairs, whose foundation is wireless channel randomness and reciprocity. Its security, however, affects not only the generated keys but more importantly, the security of the IoT networks. So far, a number of major attacks threatening the wireless key generation have been studied in the literature, but not the replay attack. In this article, we reveal the replay attack can penetrate conventional defense measures and invade the wireless key generation through both analysis and experiments, which can deteriorate the channel measurement correlation and result in a high key disagreement rate (KDR). We propose a wireless key generation approach named Kerra where we integrate a synchronized time measurement to defend against the replay attack on it. On a real IoT testbed composed of long-range (LoRa) nodes, we implement the proposed Kerra and evaluate it in terms of both key generation performance and replay attack defense. Experimental results demonstrate first the impact of the replay attack on both channel measurement correlation and KDR, then the effects of quantization and preprocessing on KDR under replay attacks, and finally, the effectiveness of the proposed Kerra whose KDRs under replay attacks are maintained to a similar level as without attacks.
KW - Internet of Things (IoT)
KW - replay attack
KW - synchronized time measurement
KW - wireless key generation
UR - http://www.scopus.com/inward/record.url?scp=85194829704&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2024.3406702
DO - 10.1109/JIOT.2024.3406702
M3 - Article
AN - SCOPUS:85194829704
SN - 2327-4662
VL - 11
SP - 29035
EP - 29048
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 17
ER -