NUST Institutional Repository

Dynamic Secret Sharing in Wireless Network for Security Purposes

Show simple item record

dc.contributor.author Bhatti, David Samuel
dc.date.accessioned 2023-07-17T04:08:30Z
dc.date.available 2023-07-17T04:08:30Z
dc.date.issued 2020
dc.identifier.other NUST201290030PSEECS2112F
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/34681
dc.description Supervisor: Dr. Syed Taha Ali en_US
dc.description.abstract Wireless networks are widely accepted in almost all fields of life. Due to the broadcast nature, extensive and across-the-board use of these networks, security is becoming a critical issue day by day in these networks. Present security measures are based on two popular encryption algorithms, Diffie-Hellman Key Exchange (DH) and RSA (the name given after its inventors Rivest-Shamir-Adleman). Public Key Infrastructure (PKI) is based on these algorithms, and these are just computationally secure. DH is vulnerable to Man In The Middle attack (MITM). Computationally secure means, with large enough computational resources DH and RSA can be breached theoretically. But, presently these resources do not exist. Short size RSA keys such as 1024-bit can be breached, but present internet applications are using 2048-bit keys that are hard to breach with existing resource until quantum computing becomes a reality. The adhoc networks are widely exercised in defense, military, disaster, and mission critical applications for pairwise as well as for group communication. Multi-party secret key establishment in low-resource networks including 802.11ah, 802.11ba (low-power WiFi), Zigbee, Bluetooth Low-Energy (BLE), and Wireless Body Area Networks (WBANs) requires fast attention of security experts. That’s why, the focus of our study has been set to provide an economical and cost effective multi-party secret key generation solution for resource-constrained adhoc setups. In our study, the results are obtained from the experiments and tests that used real IEEE 802.11 adapters. These tests, experiments and the analysis of obtained results prove this study a groundbreaking attempt towards multi-party secret key generation in the perspectives of limited storage, bandwidth, and computational resources. To address these issues, probabilistic data structures called Bloom filters have been used in this study. Bloom filters are bit-array data structures. They occupy a very small space of memory to accommodate a large number of data elements regardless of their sizes. Because they are space efficient, that’s why, the WiFi nodes in our proposed approach have used Bloom filters of a few kilo bytes for sharing the information about large numbers of frames sniffed in monitor mode. The Bloom filters are irreversible data structures. In our proposed approach, WiFi nodes with the help of these data structures exchanged i the information of their frames secretly without exchanging the actual contents of the frames. Because they are irreversible, that is why no one can extract the actual contents of the frames from them. Thus, the use of Bloom filters in our proposed scheme brings about a novelty in the process of symmetric secret key acquisition in the sense that nodes agreed upon a common secret without exchanging the actual contents of sniffed frames. Since Bloom filters consume a small amount of memory and are bit array type of data structures, that’s why they are fast to process. These space/time efficiency features make them highly suitable for low-resource scenarios. The time and space complexities of our proposed secret key generation scheme are O(log(N)) and O(L) respectively. N is the number of frames and L is the length of the Bloom filter. Our proposed approach does not depend on mathematical relationships, conditions and computations; rather it uses the wireless natural phenomenon of frame losses, hashes and symmetric cryptography. Moreover, the frame losses at an attacker and at the legitimate nodes are independent of each other. Because our study based on the natural phenomenon of frame losses, hashes and symmetric cryptography, that’s why it is resilient against future quantum attacks. In this research, the use of real IEEE 802.11 WiFi adapters and the outcome of different experiments and their in-depth analysis confirm the practicality of this work in 802.11 and similar types of wireless adhoc networks. en_US
dc.publisher School of Electrical Engineering and Computer Science (SEECS), NUST en_US
dc.subject Dynamic Secret Sharing in Wireless Network for Security Purposes, Security, Secret Key Generation, Information-Theoretic Security, Wireless Adhoc Networks, Dynamic Secrets, Ephemeral Secrets, Bloom Filters.ALLPhDTheses. en_US
dc.title Dynamic Secret Sharing in Wireless Network for Security Purposes en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account