Adaptive key generation based on quantization of channel characteristics

Length and mismatch rate of secret bit strings derived from channel characteristics by legitimate users for key generation are affected by quantization algorithm significantly. Existing schemes cannot achieve both a string and a low mismatch rate at the same time because of the static quantization method. In this paper we first propose an adaptive quantization algorithm formed of an quantizer offset with the quantization noise at one side and a quantization-level optimizing method, which maximize the length of secret bit string under the constraint of mismatch rate. Based on this algorithm, a key agreement scheme selection approach is presented to harvest longer bit strings. As a result, an adaptive key generation scheme based on quantization of channel characteristics is proposed using the above methods. With this scheme, bit strings with length close to theoretical limit can be generated, and the mismatch rate is lower than 5%.

[1]  Prakash Narayan,et al.  Secret Key and Private Key Constructions for Simple Multiterminal Source Models , 2005, IEEE Transactions on Information Theory.

[2]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[3]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[4]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.

[5]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[6]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[7]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[8]  Hisato Iwai,et al.  Secret Key Agreement Techniques based on Multipath Propagation Characteristics , 2009 .

[9]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[10]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[11]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[12]  Thomas M. Cover,et al.  Network Information Theory , 2001 .

[13]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[14]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[15]  Claude Castelluccia,et al.  An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.