Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach

Archive ouverte : Communication dans un congrès

Alouani, Ihsen

Edité par HAL CCSD ; IEEE

International audience. Several systems and application domains are under-going disruptive transformations due to the recent breakthroughs in computing paradigms such us Machine Learning and commu-nication technologies such as 5G and beyond. Intelligent trans-portation systems is one of the flagship domains that witnessed drastic transformations through the development of ML-based environment perception along with Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Such connected, intelligent and collaborative transportation systems represent a promising trend towards smart roads and cities. However, the safety-critical aspect of these cyber-physical systems requires a systematic study of their security and privacy. In fact, security-sensitive information could be transmitted between vehicles, or between vehicles and the infrastructure such as security alerts, payment, etc. Since asymmetric cryptography is heavy to implement on embedded time-critical devices, in addition to the complexity of PKI-based solutions, symmetric cryptography offers confidentiality along with high performance. However, cryptographic key generation and establishment in symmetric cryptosystems is a great challenge. Recent work proposed a key generation and establishment protocol for ve-hicular communication that is based on the reciprocity and high spatial and temporal variation properties of the vehicular communication channel. This paper investigates the limitations of such channel-based key generation protocols. Based on a channel model with a machine learning approach, we show the possibility for a passive eavesdropper to compromise the secret key in a practical manner, thereby undermining the security of such key establishment technique. Moreover, we propose a defense based on adversarial machine learning to overcome this limit.

Consulter en ligne

Suggestions

Du même auteur

CNTFET-Based Ternary Multiply-and-Accumulate Unit | Mohammaden, Amr

CNTFET-Based Ternary Multiply-and-Accumulate Unit

Archive ouverte: Article de revue

Mohammaden, Amr | 2022

International audience. Multiply-Accumulate (MAC) is one of the most commonly used operations in modern computing systems due to its use in matrix multiplication, signal processing, and in new applications such as m...

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability | Tarchoun, Bilel

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adve...

Archive ouverte: Communication dans un congrès

Tarchoun, Bilel | 2021-09-28

International audience. While machine learning applications are getting mainstream owing to a demonstrated efficiency in solving complex problems, they suffer from inherent vulnerability to adversarial attacks. Adve...

Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters | El-Allami, R.

Securing Deep Spiking Neural Networks against Adversarial Attacks through I...

Archive ouverte: Communication dans un congrès

El-Allami, R. | 2021-02-01

International audience. Deep Learning (DL) algorithms have gained popularity owing to their practical problem-solving capacity. However, they suffer from a serious integrity threat, i.e., their vulnerability to adve...

Du même sujet

Essential math for data science : take control of your data with fundamental linear algebra, probability, and statistics / Thomas Nield | Nield, Thomas. Auteur

Essential math for data science : take control of your data with fundamenta...

Livre | Nield, Thomas. Auteur | 2022

To succeed in data science you need some math proficiency. But not just any math. This common-sense guide provides a clear, plain English survey of the math you'll need in data science, including probability, statistics, hypothesi...

An evaluation of computational learning-based methods for the segmentation of nuclei in cervical cancer cells from microscopic images | Maylaa, Tarek

An evaluation of computational learning-based methods for the segmentation ...

Archive ouverte: Article de revue

Maylaa, Tarek | 2022-05-17

International audience. Background: Background: The manual segmentation of cellular structures on Z-stack microscopic images is time-consuming and often inaccurate, highlighting the need to develop auto-segmentation...

Faire la paix : la part des institutions internationales / sous la direction de Guillaume Devin |

Faire la paix : la part des institutions internationales / sous la directio...

Livre | 2009 - [Nouvelle édition entièrement refondue et actualisée]

A feminist voyage through international relations / J. Ann Tickner | Tickner, J. Ann. Auteur

A feminist voyage through international relations / J. Ann Tickner

Livre | Tickner, J. Ann. Auteur | 2014

Major Improvement in the Cycling Ability of Pseudocapacitive Vanadium Nitride Films for Micro‐Supercapacitor | Jrondi, Aiman

Major Improvement in the Cycling Ability of Pseudocapacitive Vanadium Nitri...

Archive ouverte: Article de revue

Jrondi, Aiman | 2023

International audience. Vanadium nitride film made using a thin film deposition technique is a promising electrode material for micro-supercapacitor applications owing to its high electrical conductivity and high vo...

Phototunable chip-scale topological photonics: 160 Gbps waveguide and demultiplexer for THz 6G communication | Kumar, Abhishek

Phototunable chip-scale topological photonics: 160 Gbps waveguide and demul...

Archive ouverte: Article de revue

Kumar, Abhishek | 2022-12

The authors declare that all the data supporting the findings of thisstudy are openly available in NTU research data repository DR-NTU athttps://doi.org/10.21979/N9/5FK01V.. International audience. The revolutionary...

Chargement des enrichissements...