Practical Secret Key Agreement for Full-Duplex Near Field Communications
- 18 May 2015
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Mobile Computing
- Vol. 15 (4), 938-951
- https://doi.org/10.1109/tmc.2015.2434811
Abstract
Near Field Communication (NFC) is a promising short distance radio communication technology for many useful applications. Although its communication range is short, NFC alone does not guarantee secure communication and is subject to security attacks, such as an eavesdropping attack. Generating a shared key and using symmetric key cryptography to secure the communication between NFC devices is a feasible solution to prevent various attacks. However, conventional Diffie-Hellman key agreement protocol is not preferable for resource constrained NFC devices due to its extensive computational overhead and energy consumption. In this paper, we propose a practical, fast and energy-efficient key agreement scheme, which uses random bits transmission with waveform shaking, for NFC devices by exploiting its off-the-shelf full-duplex capability. In the proposed method, two devices send random bits to each other simultaneously without strict synchronization or perfect match of amplitude and phase. On the contrary, the method randomly introduces synchronization offset and mismatch of amplitude and phase for each bit transmission in order to prevent a passive attacker from determining the generated key. A shared bit can be established when two devices send different bits. We conduct theoretical analysis on the correctness and security strength of the method, and extensive simulations to evaluate its effectiveness. We build a testbed based on USRP software defined radio and conduct proof-of-concept experiments to evaluate the method in a real-world environment. It shows that the proposed method achieves a high key generation rate of about 26 kbps and is immune to eavesdropping attack even when the attacker is within several centimeters from the legitimate devices. The proposed method is a practical, fast, energy-efficient, and secure key agreement scheme for resource-constrained NFC devices.Funding Information
- US National Science Foundation (CNS-1502584)
- US NSF EARS program (CNS-1464487)
- National Science Foundation of China (61301127)
This publication has 14 references indexed in Scilit:
- Full duplex radiosPublished by Association for Computing Machinery (ACM) ,2013
- Promoting Collaborative Mobile Payment by Using NFC-Micro SD TechnologyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Maximalist Cryptography and Computation on the WISP UHF RFID TagPublished by Springer Science and Business Media LLC ,2013
- Practical provably secure key sharing for near field communication devicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Link Budget and Capacity Performance of Inductively Coupled Resonant LoopsIEEE Transactions on Antennas and Propagation, 2012
- NFC-Based User InterfacesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Public-Key Cryptography for RFID-TagsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Noisy Cryptographic Protocols for Low-Cost RFID TagsIEEE Transactions on Information Theory, 2006
- Noisy Tags: A Pretty Good Key Exchange Protocol for RFID TagsLecture Notes in Computer Science, 2006
- Time, clocks, and the ordering of events in a distributed systemCommunications of the ACM, 1978