Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Shared secret key establishment method between wireless equipment based on receiving signal intensity

A technology for receiving signal strength and wireless devices, applied in the field of information security, can solve problems such as identity forgery, poor applicability in static environments, and eavesdropping attacks, and achieve the effects of resisting man-in-the-middle attacks, enhancing applicability, and resisting identity forgery or eavesdropping attacks

Active Publication Date: 2015-12-23
INST OF INFORMATION ENG CAS +1
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, one of the shortcomings of the existing device authentication technology and shared key establishment technology based on wireless channel characteristics is that it has poor applicability to static environments, and it will suffer from identity forgery or eavesdropping attacks in static environments.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared secret key establishment method between wireless equipment based on receiving signal intensity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0045] Accompanying drawing is the flow chart of the present invention, here we provide a smart phone and a smart wristband to adopt the method proposed by the present invention to complete the specific steps of safe key sharing with a length of 128 bits, as follows:

[0046] 0) The user respectively presses the virtual key on the mobile phone (initiating device) application and the physical key on the bracelet (responsive device), and puts the two in a pairing ready state;

[0047] 1) The user holds the mobile phone and the bracelet with the same hand, keeps the relative position of the two stable, and then starts to wave the arm quickly to drive the mobile phone and the bracelet to move together in the air;

[0048] 2) When the acceleration sensor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a shared secret key establishment method between wireless equipment based on receiving signal intensity. The method comprises the steps that 1) a security isolation environment is created for two sets of wireless equipment; 2) initiation equipment transmits multiple authentication requests to response equipment according to the set transmitting power and the set time interval; 3) the response equipment calculates the standard deviation of the receiving signal intensity; and if the standard deviation of the receiving signal intensity is less than a threshold value, an authentication passing message is replied to the initiation equipment, or authentication is not passed; 4) the initiation equipment generates a secret key K of which length is m bits, and then transmits m data packets to the response equipment; 5) the response equipment records the signal receiving intensity of the m data packets and recovers a secret key K' of which length is m bits according to m receiving signal intensity, and then replies a message encrypted by the secret key K'; and 6) the initiation equipment performs decryption by using the secret key K, and replies an authentication success message if decryption is successful so that secret key sharing is completed. Communication security is greatly enhanced by the shared secret key establishment method between the wireless equipment based on the receiving signal intensity.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a method for establishing a shared key for wireless devices, in particular to a method for establishing a shared key between wireless devices based on received signal strength. Background technique [0002] The establishment of a shared key between wireless devices is the first step in wireless encrypted communication. The typical types of shared key establishment techniques include the method of presetting the shared key and the shared key establishment mechanism based on public key cryptography. Among them, the method of presetting the shared key is suitable for conveniently establishing a shared key between wireless devices that are uniformly manufactured and deployed, but not suitable for wireless networks with flexible structures such as mobile ad hoc networks, especially A shared key is established between two unfamiliar wireless devices. [0003] The shared ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 林璟锵王伟王展王泽赵宇航
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products