Abstract-It has been shown that the radio channel impulse response for a pair of legitimate Ultra-wide band (UWB) transceivers can be used to generate secret keys for secure communications. Past proposed secret key generation algorithms under-exploited the available number of secret key bits from the radio channel. This paper proposes a new efficient method for generation of the shared key where the transceivers use LDPC decoders to resolve the differences in their channel impulse response measurements caused by measurement noise. To ensure secret key agreement, a method of public discussion between the two users is performed using the syndrome from Hamming (7,3) binary codes. An algorithm is proposed to check the equality of generated keys for both legitimate users, and ensure error-free secure communication. The security of this algorithm has been verified by AVISPA. Comparisons are performed with previous work on secret key generation and it has been shown that this algorithm reliably generates longer secret keys in standard UWB radio channels.
Despite 30 years of on-going effort, spam remains a significant problem. While technology has abated the deluge of spam invading the average user's email inbox, spam still facilitates the sale of counterfeited products, distribution of malware, and other criminal activities -as well as the more insidious use of spear phishing to leverage attacks into corporate and government networks. The value of email arises directly from its anyone-to-anyone message-passing capability. Hence, anti-spam techniques based on end-point encryption have met with limited success. Furthermore, due to geopolitical concerns, most traceback techniques only work effectively within -and not across -geopolitical boundaries; and while targeted removal of spam-friendly ISPs and botnets has had significant impacts on spam rates, these gains have tended to be short lived.This work proposes a novel approach to control spam and spear phishing through combining peer-level quality-of-service (QoS) agreements with a ProVerif verified, non-repudiable traceback protocol to enact spam resistant overlays that are: i) scalable, ii) enforceable over geopolitical boundaries, and iii) do not require technological sea changes. Simulation results on an Internet-style network of 3,000 ISPs show that even in the presence of aggressive spammers, it is possible to reduce the spam versus normal email equilibrium from 90:10 to 20:80. Furthermore, this approach can be used to aid in controlling spear phishing attacks targeting federated organizations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.