Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information

This paper concerns on inefficiency or even failure in secret key generation caused by the imperfect channel state information. We propose a secret key generation scheme based on wavelet analysis. Firstly, the channel estimates are pre-processed by wavelet analysis to improve the correlation. Secondly, to ensure the randomness of the secret keys, an adaptive equal probability quantization approach is proposed to quantize the estimates. Then, the quantized preliminary keys are reconciled and their privacy is amplified to obtain a final secure key. Furthermore, we validate the feasibility of the proposed scheme in real environments. Simulation and testing results all show that the proposed scheme achieves remarkable improvement in terms of bit mismatch rate and key generation rate compared with existing schemes. Besides, for the randomness, the generated keys pass the National Institute of Standards and Technology (NIST) test.

[1]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[2]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  C. Burrus,et al.  Optimal wavelet representation of signals and the wavelet sampling theorem , 1994 .

[4]  Jie Yang,et al.  Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.

[5]  Mounir Ghogho,et al.  Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region , 2014, IET Commun..

[6]  A. Ambekar,et al.  Improving channel reciprocity for effective key management systems , 2012, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE).

[7]  C. Burrus,et al.  Introduction to Wavelets and Wavelet Transforms: A Primer , 1997 .

[8]  Victor C. M. Leung,et al.  Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.

[9]  Victor C. M. Leung,et al.  Radiated Power Scaling Factor and Its Effect on The Secrecy Performance of Multi-user Massive MIMO System , 2015, MSCC '15.

[10]  Takahiro Hara,et al.  A survey on communication and data management issues in mobile sensor networks , 2014, Wirel. Commun. Mob. Comput..

[11]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[12]  Hans D. Schotten,et al.  Enhancing Channel Reciprocity for Effective Key Management in Wireless Ad-Hoc Networks , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[13]  Dongtang Ma,et al.  Secret key generation via random beamforming in stationary environment , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[14]  Junqing Zhang,et al.  An effective key generation system using improved channel reciprocity , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[16]  A. Ambekar,et al.  Improved method of secret key generation based on variations in wireless channel , 2012, 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP).

[17]  Xianbin Wang,et al.  Secret Key Generation Using Physical Channels with Imperfect CSI , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).

[18]  W. C. Jakes,et al.  Microwave Mobile Communications , 1974 .