TY - JOUR
T1 - A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement
AU - Hu, Qiao
AU - Du, Bianxia
AU - Markantonakis, Konstantinos
AU - Hancke, Gerhard P.
PY - 2020/1
Y1 - 2020/1
N2 - Physical-layer key agreement is used to generate a shared key between devices on demand. Such schemes utilize the characteristics of the wireless channel to generate the shared key from the device-to-device channel. As all characteristics are time-dependent and location-dependent, it is hard for eavesdroppers to get the key. However, most research works in this area use passive attack models whereas active attacks that aim at manipulating the channel and key are also possible. Physical-layer key agreement with User Introduced Randomness (PHY-UIR) is a solution similar to the Diffie-Hellman protocol against such a kind of active attack. The users (devices) introduce their own randomness to help to prevent active attacks. In this paper, we analyze the possibility of launching a session hijacking attack on PHY-UIR to allow an attacker to control the shared key established. The session hijacking attack manipulates the key agreement through a man-in-the-middle interaction and forces legitimate devices to run the PHY-UIR protocol with the attacker. Our simulation and experiment results validate our attack and show the high performance of our attack on manipulating the generated key. We also propose PHY-UIR+ where devices simultaneously exchange information about the established shared keys, which allows them to detect whether they have agreed to different keys with a third party.
AB - Physical-layer key agreement is used to generate a shared key between devices on demand. Such schemes utilize the characteristics of the wireless channel to generate the shared key from the device-to-device channel. As all characteristics are time-dependent and location-dependent, it is hard for eavesdroppers to get the key. However, most research works in this area use passive attack models whereas active attacks that aim at manipulating the channel and key are also possible. Physical-layer key agreement with User Introduced Randomness (PHY-UIR) is a solution similar to the Diffie-Hellman protocol against such a kind of active attack. The users (devices) introduce their own randomness to help to prevent active attacks. In this paper, we analyze the possibility of launching a session hijacking attack on PHY-UIR to allow an attacker to control the shared key established. The session hijacking attack manipulates the key agreement through a man-in-the-middle interaction and forces legitimate devices to run the PHY-UIR protocol with the attacker. Our simulation and experiment results validate our attack and show the high performance of our attack on manipulating the generated key. We also propose PHY-UIR+ where devices simultaneously exchange information about the established shared keys, which allows them to detect whether they have agreed to different keys with a third party.
KW - Key management
KW - physical-layer security
UR - http://www.scopus.com/inward/record.url?scp=85078280708&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-85078280708&origin=recordpage
U2 - 10.1109/TII.2019.2923662
DO - 10.1109/TII.2019.2923662
M3 - RGC 21 - Publication in refereed journal
SN - 1551-3203
VL - 16
SP - 691
EP - 702
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
IS - 1
M1 - 8741092
ER -