scholarly journals Vibration-based Key Exchange among Multiple Smart Devices on the Desk

2016 ◽  
Vol 21 (2) ◽  
pp. 33-43
Author(s):  
Alisa Arno ◽  
Kentaroh Toyoda ◽  
Yuji Watanabe ◽  
Iwao Sasase ◽  
P. Takis Mathiopoulos

Abstract Eavesdropping is an important and real concern in mobile NFC (Near Filed Communication) payment and data sharing applications. Although the DH (Diffie-Hellman) scheme has been widely used in key exchange for secure communications, it may fail in indoor environments due to its vulnerability against man-in-the-middle attack. In this paper, we propose a new vibration-based key exchange among multiple smart devices which are placed on a desk. In this scheme, devices are assumed to be located next to each other with each of them vibrating with patterns converted from a key to be exchanged. The vibration patterns are measured by an accelerometer and each key is recovered from the measured acceleration. The proposed scheme has been implemented using Android smartphones and various experimental performance evaluation results have validated its effectiveness.

2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Yuling Chen ◽  
Xiaohan Hao ◽  
Wei Ren ◽  
Yi Ren

While key negotiation schemes, such as those based on Diffie–Hellman, have been the subject of ongoing research, designing an efficient and security scheme remains challenging. In this paper, we propose a novel key negotiation scheme based on blockchain, which can be deployed in blockchain-enabled contexts such as data sharing or facilitating electric transactions between vehicles (e.g., unmanned vehicles). We propose three candidates for flexible selection, namely, key exchanges via transaction currency values through value channels (such as the amount in transactions), automated key exchanges through static scripts,and dynamic scripts, which can not only guarantee key availability with timeliness but also defend against MITM (man-in-the-middle) attacks, packet-dropping attacks, and decryption failure attacks.


IJARCCE ◽  
2017 ◽  
Vol 6 (4) ◽  
pp. 307-311
Author(s):  
Mr. Ajeet Kumar Bhartee ◽  
Neha Pal ◽  
Abhishek Verma

2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Myoungbeom Chung ◽  
Ilju Ko

We proposed a useful data-sharing method among multi-smart devices at close range using inaudible frequencies and Wi-Fi. The existing near data-sharing methods mostly use Bluetooth technology, but these methods have the problem of being unable to be operated using different operating systems. To correct this flaw, the proposed method that uses inaudible frequencies through the inner speaker and microphone of smart device can solve the problems of the existing methods. Using the proposed method, the sending device generates trigger signals composed of inaudible sound. Moreover, smart devices that receive the signals obtain the shared data from the sending device through Wi-Fi. To evaluate the efficacy of the proposed method, we developed a near data-sharing application based on the trigger signals and conducted a performance evaluation experiment. The success rate of the proposed method was 98.8%. Furthermore, we tested the user usability of the Bump application and the proposed method and found that the proposed method is more useful than Bump. Therefore, the proposed method is an effective approach for sharing data practically among multi-smart devices at close range.


2018 ◽  
Vol 10 (1) ◽  
pp. 147-160
Author(s):  
Amine Khaldi

Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.


2020 ◽  
Vol 55 (6) ◽  
Author(s):  
Rasha M. Mohsin ◽  
Rasha I. Ahmed ◽  
Zinah R. Hussein

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 500 per frame, and each number value reaches more than 1000 to be used or switched when needed. The method also provides some difficulty in guessing the keys from the transmitted video and the reason for the development and emergence of many communication programs Viber, WhatsApp, and other programs, enabling to use the proposed method in these programs.


Sign in / Sign up

Export Citation Format

Share Document