LoRa-Key: Secure Key Generation System for LoRa-Based Network

Physical layer key generation that exploits reciprocity and randomness of wireless fading channels has attracted considerable attention in recent years. Despite much research efforts in this field, the problem of wireless key generation at long distance and low data rate remains unknown and has not been studied. In this paper, we conduct extensive experiments and analysis in real indoor and outdoor environments to explore the feasibility of wireless key generation for long range (LoRa)-based network. Our experimental results show that: 1) the low transmission rate will lead to low channel reciprocity which makes wireless key generation significantly challenging and 2) when the requirement of high reciprocity is fulfilled, two nodes can generate the same secret key even when they are far away from each other (a few kilometers). Building on the strengths of existing secret key extraction approaches, we present LoRa-Key, the first complete key establishment protocol for LoRa network by exploring the shared randomness extracted from measured received signal strength indicator. LoRa-Key employs a number of signal processing techniques to improve key generation rate significantly. Moreover, we propose a novel compressive sensing-based reconciliation framework to reduce mismatch rate. Experimental results show that LoRa-Key can achieve key establishment rates of 18 bit/s in stationary scenario and 31 bit/s in mobile scenario. To the best of our knowledge, this is the first work that studies key generation protocol for LoRa network.

[1]  Y. Rachlin,et al.  The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[2]  Ueli Maurer,et al.  Linking information reconciliation and privacy amplification , 1997, Journal of Cryptology.

[3]  Neil W. Bergmann,et al.  Gait-Key , 2017, ACM Trans. Sens. Networks.

[4]  P. J. Marcelis,et al.  DaRe: Data Recovery through Application Layer Coding for LoRaWAN , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[5]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[6]  Henri Ruotsalainen,et al.  Towards Wireless Secret key Agreement with LoRa Physical Layer , 2018, ARES.

[7]  Sanjay Jha,et al.  DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).

[8]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[9]  Jie Yang,et al.  Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[10]  Gang Wang,et al.  Gaussian field consensus: A robust nonparametric matching method for outlier rejection , 2018, Pattern Recognit..

[11]  Qian Zhang,et al.  Secret from Muscle: Enabling Secure Pairing with Electromyography , 2016, SenSys.

[12]  Sanjay Jha,et al.  Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[13]  Lajos Hanzo,et al.  Channel-Envelope Differencing Eliminates Secret Key Correlation: LoRa-Based Key Generation in Low Power Wide Area Networks , 2018, IEEE Transactions on Vehicular Technology.

[14]  Hideichi Sasaoka,et al.  IEEE802.15.4 ESPARSKey (Encryption Scheme Parasite Array Radiator Secret Key) , 2006 .

[15]  Massimo Fornasier,et al.  Compressive Sensing , 2015, Handbook of Mathematical Methods in Imaging.

[16]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[17]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[18]  S. Frick,et al.  Compressed Sensing , 2014, Computer Vision, A Reference Guide.

[19]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[20]  William H. Press,et al.  Numerical recipes , 1990 .

[21]  Wen Hu,et al.  GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait , 2019, IEEE Transactions on Dependable and Secure Computing.

[22]  Neil W. Bergmann,et al.  Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[23]  Huaxiang Zhang,et al.  A Weighted Sparse Neighbourhood-Preserving Projections for Face Recognition , 2017 .

[24]  Xudong Wang,et al.  Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.

[25]  Syed Taha Ali,et al.  Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.

[26]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[27]  Xiang-Yang Li,et al.  Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.

[28]  R.G. Baraniuk,et al.  Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.

[29]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..

[30]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[31]  Ivan Martinovic,et al.  Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.

[32]  Sanjay Jha,et al.  Secure key generation and distribution protocol for wearable devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[33]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[34]  Jie Yang,et al.  Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.

[35]  Yong Xiang,et al.  On the Security of Compressed Sensing-Based Signal Cryptosystem , 2015, IEEE Transactions on Emerging Topics in Computing.

[36]  Yao Zhao,et al.  Multiple Description Coding With Randomly and Uniformly Offset Quantizers , 2014, IEEE Transactions on Image Processing.

[37]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[38]  Martin J. Wainwright,et al.  Information-Theoretic Limits on Sparse Signal Recovery: Dense versus Sparse Measurement Matrices , 2008, IEEE Transactions on Information Theory.

[39]  Panlong Yang,et al.  SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.

[40]  W. Press,et al.  Savitzky-Golay Smoothing Filters , 2022 .

[41]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.