Due to the unavoidable shared nature of the wireless radio spectrum, providing security for wireless communications presents unique challenges. Cryptographic keys have been used as a primary technique for securing wireless networks but are not completely secure. The symmetric keys used for cryptographic purposes are vulnerable to man-in-the-middle and brute force attacks. More recently, PHY-layer based techniques have gained significant attention, where the principle of channel reciprocity and the natural randomness of the measured wireless channel to generate secret keys is leveraged. Although, PHY-layer secret key generation has been investigated and presented in the literature before, there has been a lack of discussion in terms of obtaining symmetric keys on both ends of the link. In this work, we present a novel PHY-layer secret key generation technique that aims for symmetric encryption keys while limiting the information leaked to an eavesdropper to ensure complete secrecy and to prevent potential intelligent attacks. Our algorithm utilizes forward and backward channel state information in a given wireless link and combats the minute differences observed in these pairs by generating channel trend information. We demonstrate our technique using experimental results from a realtime SDR testbed connected to a wireless channel emulator. Our results indicate that the algorithm is successful in generating symmetric keys under various wireless environments without revealing any information pertaining to the key via the open wireless channel. Our secret key extraction rate can reach values in excess of 17.3 Kbps.
[1]
Dina Katabi,et al.
Physical layer wireless security made fast and channel independent
,
2011,
2011 Proceedings IEEE INFOCOM.
[2]
Lassi Hentila,et al.
WINNER II Channel Models
,
2009
.
[3]
Arjen K. Lenstra,et al.
Ron was wrong, Whit is right
,
2012,
IACR Cryptol. ePrint Arch..
[4]
Stark C. Draper,et al.
Secret key generation through OFDM multipath channel
,
2011,
2011 45th Annual Conference on Information Sciences and Systems.
[5]
Jens B. Schmitt,et al.
On key agreement in wireless sensor networks based on radio transmission properties
,
2009,
2009 5th IEEE Workshop on Secure Network Protocols.
[6]
Sneha Kumar Kasera,et al.
Robust uncorrelated bit extraction methodologies for wireless sensors
,
2010,
IPSN '10.
[7]
Akbar M. Sayeed,et al.
Secure wireless communications: Secret keys through multipath
,
2008,
2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[8]
Sneha Kumar Kasera,et al.
Secret Key Extraction from Wireless Signal Strength in Real Environments
,
2009,
IEEE Transactions on Mobile Computing.
[9]
A. Mammela,et al.
Improved design of a CRLH leaky-wave antenna and its application for DoA estimation
,
2013,
2013 IEEE-APS Topical Conference on Antennas and Propagation in Wireless Communications (APWC).