• DocumentCode
    58874
  • Title

    Proximity-Based Security Techniques for Mobile Users in Wireless Networks

  • Author

    Xiao, Liye ; Yan, Qingzeng ; Lou, Wenjing ; Chen, Gang ; Hou, Y.T.

  • Author_Institution
    Department of Communication Engineering, Xiamen University, Xiamen, China
  • Volume
    8
  • Issue
    12
  • fYear
    2013
  • fDate
    Dec. 2013
  • Firstpage
    2089
  • Lastpage
    2100
  • Abstract
    In this paper, we propose a privacy-preserving proximity-based security system for location-based services in wireless networks, without requiring any pre-shared secret, trusted authority, or public key infrastructure. In this system, the proximity-based authentication and session key establishment are implemented based on spatial temporal location tags. Incorporating the unique physical features of the signals sent from multiple ambient radio sources, the location tags cannot be easily forged by attackers. More specifically, each radio client builds a public location tag according to the received signal strength indicators, sequence numbers, and media access control (MAC) addresses of the ambient packets. Each client also keeps a secret location tag that consists of the packet arrival time information to generate the session keys. As clients never disclose their secret location tags, this system is robust against eavesdroppers and spoofers outside the proximity range. The system improves the authentication accuracy by introducing a nonparametric Bayesian method called infinite Gaussian mixture model in the proximity test and provides flexible proximity range control by taking into account multiple physical-layer features of various ambient radio sources. Moreover, the session key establishment strategy significantly increases the key generation rate by exploiting the packet arrival time of the ambient signals. The authentication accuracy and key generation rate are evaluated via experiments using laptops in typical indoor environments.
  • Keywords
    Authentication; Bayes methods; Encryption; Gaussian mixture model; Wireless networks; Authentication; Gaussian mixture model; encryption; wireless networks;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2013.2286269
  • Filename
    6637046