End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models

Physical layer key generation got much attention during the last time. However, the need of a common physical channel implies that only point-to-point keys can be generated. In this chapter, we investigate approaches how these point-to-point keys can be used for a secure establishment of end-to-end keys between two users who can only communicate over a multi-hop network. We start with a review of physical layer key generation taking different attacker models into account. Subsequently, we introduce general approaches for the end-to-end key establishment in the presence of various attackers who differ in their behavior and their area of control. We discuss four different path selection algorithms for the key establishment and evaluate their performance by means of simulations. The results show that the end-to-end key establishment can be protected by means of physical layer keys with a reasonable effort if suitable path selection is applied.

[1]  Eduard A. Jorswieck,et al.  Maximization of worst-case secret key rates in MIMO systems with eavesdropper , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[2]  Eduard A. Jorswieck,et al.  Precoding for secret key generation in multiple antenna channels with statistical channel state information , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Eduard A. Jorswieck,et al.  Secret key generation from reciprocal spatially correlated MIMO channels , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[4]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[5]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[6]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[7]  Javier Vía,et al.  Robust secret key capacity for the MIMO induced source model , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Matthieu Bloch,et al.  Secret Sharing over Fast-Fading MIMO Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[9]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[10]  Gerhard Fettweis,et al.  Pathways to servers of the future , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[11]  Shlomo Shamai,et al.  Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[12]  Taieb Znati,et al.  End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.

[13]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[14]  Eduard A. Jorswieck,et al.  Pilot-based secret key agreement for reciprocal correlated MIMÓME block fading channels , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).