Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios

Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB allows high levels of mutual information to be obtained by a given A and B through independent characterizations of their shared communication channel. This mutual information determines the maximum secret key rate available to A and B. Since UWB channel gains change drastically with small antenna movements, it is inherently difficult for eavesdroppers to obtain channel measurements and reduce the secret key rate. In essence, UWB can provide spatial-temporal specific secret keys. Upper bounds on the secret key rate for standard UWB channels are calculated. It is demonstrated that high secure key generation rates are possible. It is shown that these key rates can be generated over a wide range of signal to noise ratios and channel synchronization errors.

[1]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..

[2]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[3]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[4]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[5]  Desmond P. Taylor,et al.  A Statistical Model for Indoor Multipath Propagation , 2007 .

[6]  Rudolf Ahlswede,et al.  Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.

[7]  D. Cheung,et al.  Spatial correlation of UWB signals in a home environment , 2002, 2002 IEEE Conference on Ultra Wideband Systems and Technologies (IEEE Cat. No.02EX580).

[8]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[9]  J. Foerster,et al.  Channel modeling sub-committee report final , 2002 .

[10]  John McEachen,et al.  Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[11]  J. Muramatu Secret key agreement from correlated source outputs using LDPC matrices , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[12]  Ueli Maurer,et al.  Protocols for Secret Key Agreement by Public Discussion Based on Common Information , 1992, CRYPTO.

[13]  Ali Shahzadi,et al.  Secret key Capacity for Wireless Nakagami and Suzuki Fading Channels , 2007 .

[14]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[15]  John G. Proakis,et al.  Digital Communications , 1983 .

[16]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[17]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security - Part I: Theoretical Aspects , 2006, ArXiv.

[18]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[19]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security - Part II: Practical Implementation , 2006, ArXiv.

[20]  G.S. Smith,et al.  A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.

[21]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[22]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[23]  Imre Csiszár,et al.  Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.