A common key generation technique based on similarity of received signal strength for secure wireless face-to-face communication

T. Honda, A. Noda, Y. Arakawa, S. Tagashira, T. Kitasuka, T. Kitaguchi, N. Tsumura, A. Fukuda

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A spread of short-range and infrastructure-less wireless communication devices increases opportunities for temporarily exchanging information in a face-to-face style, called wireless face-to-face communication. In such wireless communication, a critical issue with secure information exchange is encryption key sharing without the aid of any centralized administration. In this paper, we propose a novel key sharing technique for wireless face-to-face communications. The main idea is to generate the same encryption key on a communication pair using received signal strength indicators (RSSI) from observable wireless LAN appliances, rather than distribute a prepared key between the pair. The generation for the same key is realized by utilizing the similarity of RSSI observed within a small area. Furthermore, we examine the successful ratio for generating the same key and consider the security level for the proposed method.

Original languageEnglish
Title of host publication8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010
Publication statusPublished - 2010
Event8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010 - Kuching, Malaysia
Duration: Jun 15 2010Jun 18 2010

Publication series

Name8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010

Other

Other8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010
CountryMalaysia
CityKuching
Period6/15/106/18/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A common key generation technique based on similarity of received signal strength for secure wireless face-to-face communication'. Together they form a unique fingerprint.

Cite this