Active tapping scheme to wireless secret key generator employing Duplex Amplifying Repeater

This paper proposes an active tapping scheme to wireless secret key generator (WSKG), and evaluates tapping tolerance of WSKG for the active tapping scheme. An active tapping scheme is a tapping scheme in which the eavesdropper attacks user terminals actively. The proposal active tapping scheme amplifies a wavelet between two user terminals by DAR (Duplex Amplifying Repeater), and an amplified wavelet dominates RSSI profiles of user terminals. Eve intercepts the wavelet, and is able to estimate the RSSI profile. We simulated WSKG with the proposal active tapping scheme in a 2D rectangular room surrounded by concrete walls. The results indicated that the proposal scheme can get high correlation between user terminals' RSSI profiles and Eve's RSSI profile.

[1]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[2]  Stephen W. Neville,et al.  Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[4]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[5]  Hisato Iwai,et al.  Experimental validation of wireless secret key agreement using array antennas , 2011, 2011 XXXth URSI General Assembly and Scientific Symposium.

[6]  Takashi Ohira,et al.  Impact of direct-path wave on Imac in secret key agreement system using ESPAR antennas , 2011, 2011 XXXth URSI General Assembly and Scientific Symposium.

[7]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[8]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[9]  Kazukuni Kobara,et al.  On the Possibility of Key Agreement Using Variable Directional Antenna , 2006 .

[10]  T. Ohira,et al.  Fast beamforming of electronically steerable parasitic array radiator antennas: theory and experiment , 2004, IEEE Transactions on Antennas and Propagation.

[11]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[12]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.