Projects per year
Abstract
The confidentiality of communications in the Internet of Things (IoT) is critical, with cryptography being currently the most widely employed method to achieve it. Establishing cryptographically secure communication links between two transceivers requires the pre-agreement on some key, unknown to an external attacker. In recent years there has been growing interest for techniques that generate a shared random key through observation of the channel and its effects on the exchanged messages. The maximum length of that key is characterised by the Mutual Information (MI) between the observations of the two radios. In this work we examine the practical limits of the MI of off-the-shelf transceivers communicating through the IEEE 802.15.4 specification in an indoor office environment, and calculate the secret-key capacity, that is, the maximum length of an extracted secret-key in the presence of an eavesdropper. Furthermore, we study how using groups of observations can affect the MI and both analytically and experimentally prove that grouping observations leads to better results and an increased key-capacity.
Original language | English |
---|---|
Title of host publication | 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016) |
Subtitle of host publication | Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 311-316 |
Number of pages | 6 |
ISBN (Electronic) | 9781509041305 |
ISBN (Print) | 9781509041312 |
DOIs | |
Publication status | Published - Mar 2017 |
Event | 3rd IEEE World Forum on Internet of Things, WF-IoT 2016 - Reston, United States Duration: 12 Dec 2016 → 14 Dec 2016 |
Conference
Conference | 3rd IEEE World Forum on Internet of Things, WF-IoT 2016 |
---|---|
Country/Territory | United States |
City | Reston |
Period | 12/12/16 → 14/12/16 |
Research Groups and Themes
- Digital Health
- SPHERE
Fingerprint
Dive into the research topics of 'Practical limits of the secret key-capacity for IoT physical layer security'. Together they form a unique fingerprint.Projects
- 1 Finished
-
SPHERE (EPSRC IRC)
Craddock, I. J. (Principal Investigator), Coyle, D. T. (Principal Investigator), Flach, P. A. (Principal Investigator), Kaleshi, D. (Principal Investigator), Mirmehdi, M. (Principal Investigator), Piechocki, R. J. (Principal Investigator), Stark, B. H. (Principal Investigator), Ascione, R. (Co-Principal Investigator), Ashburn, A. M. (Collaborator), Burnett, M. E. (Collaborator), Damen, D. (Co-Principal Investigator), Gooberman-Hill, R. (Principal Investigator), Harwin, W. S. (Collaborator), Hilton, G. (Co-Principal Investigator), Holderbaum, W. (Collaborator), Holley, A. P. (Manager), Manchester, V. A. (Administrator), Meller, B. J. (Other ), Stack, E. (Collaborator) & Gilchrist, I. D. (Principal Investigator)
1/10/13 → 30/09/18
Project: Research, Parent