TY - GEN
T1 - A common key generation technique based on similarity of received signal strength for secure wireless face-to-face communication
AU - Honda, T.
AU - Noda, A.
AU - Arakawa, Y.
AU - Tagashira, S.
AU - Kitasuka, T.
AU - Kitaguchi, T.
AU - Tsumura, N.
AU - Fukuda, A.
PY - 2010
Y1 - 2010
N2 - A spread of short-range and infrastructure-less wireless communication devices increases opportunities for temporarily exchanging information in a face-to-face style, called wireless face-to-face communication. In such wireless communication, a critical issue with secure information exchange is encryption key sharing without the aid of any centralized administration. In this paper, we propose a novel key sharing technique for wireless face-to-face communications. The main idea is to generate the same encryption key on a communication pair using received signal strength indicators (RSSI) from observable wireless LAN appliances, rather than distribute a prepared key between the pair. The generation for the same key is realized by utilizing the similarity of RSSI observed within a small area. Furthermore, we examine the successful ratio for generating the same key and consider the security level for the proposed method.
AB - A spread of short-range and infrastructure-less wireless communication devices increases opportunities for temporarily exchanging information in a face-to-face style, called wireless face-to-face communication. In such wireless communication, a critical issue with secure information exchange is encryption key sharing without the aid of any centralized administration. In this paper, we propose a novel key sharing technique for wireless face-to-face communications. The main idea is to generate the same encryption key on a communication pair using received signal strength indicators (RSSI) from observable wireless LAN appliances, rather than distribute a prepared key between the pair. The generation for the same key is realized by utilizing the similarity of RSSI observed within a small area. Furthermore, we examine the successful ratio for generating the same key and consider the security level for the proposed method.
UR - http://www.scopus.com/inward/record.url?scp=77956461133&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77956461133&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:77956461133
SN - 9781424464135
T3 - 8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010
BT - 8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010
T2 - 8th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2010
Y2 - 15 June 2010 through 18 June 2010
ER -