Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach

Archive ouverte : Communication dans un congrès

Alouani, Ihsen

Edité par HAL CCSD ; IEEE

International audience. Several systems and application domains are under-going disruptive transformations due to the recent breakthroughs in computing paradigms such us Machine Learning and commu-nication technologies such as 5G and beyond. Intelligent trans-portation systems is one of the flagship domains that witnessed drastic transformations through the development of ML-based environment perception along with Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Such connected, intelligent and collaborative transportation systems represent a promising trend towards smart roads and cities. However, the safety-critical aspect of these cyber-physical systems requires a systematic study of their security and privacy. In fact, security-sensitive information could be transmitted between vehicles, or between vehicles and the infrastructure such as security alerts, payment, etc. Since asymmetric cryptography is heavy to implement on embedded time-critical devices, in addition to the complexity of PKI-based solutions, symmetric cryptography offers confidentiality along with high performance. However, cryptographic key generation and establishment in symmetric cryptosystems is a great challenge. Recent work proposed a key generation and establishment protocol for ve-hicular communication that is based on the reciprocity and high spatial and temporal variation properties of the vehicular communication channel. This paper investigates the limitations of such channel-based key generation protocols. Based on a channel model with a machine learning approach, we show the possibility for a passive eavesdropper to compromise the secret key in a practical manner, thereby undermining the security of such key establishment technique. Moreover, we propose a defense based on adversarial machine learning to overcome this limit.

Consulter en ligne

Suggestions

Du même auteur

CNTFET-Based Ternary Multiply-and-Accumulate Unit

Archive ouverte: Article de revue

Mohammaden, Amr | 2022

International audience. Multiply-Accumulate (MAC) is one of the most commonly used operations in modern computing systems due to its use in matrix multiplication, signal processing, and in new applications such as m...

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adve...

Archive ouverte: Communication dans un congrès

Tarchoun, Bilel | 2021-09-28

International audience. While machine learning applications are getting mainstream owing to a demonstrated efficiency in solving complex problems, they suffer from inherent vulnerability to adversarial attacks. Adve...

Securing Deep Spiking Neural Networks against Adversarial Attacks through I...

Archive ouverte: Communication dans un congrès

El-Allami, R. | 2021-02-01

International audience. Deep Learning (DL) algorithms have gained popularity owing to their practical problem-solving capacity. However, they suffer from a serious integrity threat, i.e., their vulnerability to adve...

Du même sujet

An evaluation of computational learning-based methods for the segmentation ...

Archive ouverte: Article de revue

Maylaa, Tarek | 2022-05-17

International audience. Background: Background: The manual segmentation of cellular structures on Z-stack microscopic images is time-consuming and often inaccurate, highlighting the need to develop auto-segmentation...

Faire la paix : la part des institutions internationales / sous la directio...

Livre | 2009 - [Nouvelle édition entièrement refondue et actualisée]

Major Improvement in the Cycling Ability of Pseudocapacitive Vanadium Nitri...

Archive ouverte: Article de revue

Jrondi, Aiman | 2023

International audience. Vanadium nitride film made using a thin film deposition technique is a promising electrode material for micro-supercapacitor applications owing to its high electrical conductivity and high vo...

Phototunable chip-scale topological photonics: 160 Gbps waveguide and demul...

Archive ouverte: Article de revue

Kumar, Abhishek | 2022-12

The authors declare that all the data supporting the findings of thisstudy are openly available in NTU research data repository DR-NTU athttps://doi.org/10.21979/N9/5FK01V.. International audience. The revolutionary...

GDR HOWDI 2022 Meeting : GAP(111)B-SE Surface for TMD epitaxial growth

Archive ouverte: Poster de conférence

Chapuis, Niels | 2022-05-09

International audience. Over the past few years, 2D-Transition Metal Dichalcogenides (TMDs) have revealed great potential for optoelectronics and nanoelectronics devices, thanks to their exceptional properties, not ...

Tunable Topological Acoustic Tamm States in Comblike Structures Based on Ba...

Archive ouverte: Article de revue

Khattou, Soufyane | 2022-12

International audience. We investigate the existence of acoustic Tamm states at the interface between two one-dimensional (1D) comblike phononic crystals (PnCs) based on slender tubes and discuss their topological o...

Chargement des enrichissements...