Security Analysis of a Novel Artificial Randomness Approach for Fast Key Generation

Wireless key generation in slow fading channels is challenging because of the limited channel variation and randomness. This paper proposes a novel artificial randomness (AR) assisted approach for fast key generation in slow fading environments. It integrates user-designed randomness into the channel probing to form a fast-changing combined channel to realize information-theory security. The analytical expressions of secret key capacity are derived. We find that it is possible to improve secret key capacity by introducing AR when legitimate users have a better channel condition than that of eavesdropper. We also find that the improved secret key capacity is proportional to the channel probing number and is bounded by the noise variance and channel condition. Simulation and experimental results show that AR approach can generate secret key effectively in slow fading environments by carefully designing probing numbers. Compared to existing work in literature, the proposed approach does not rely on multiple antennas or extra helpers, and it can be applied in both single antenna and multi-antenna systems.

[1]  Eduard A. Jorswieck,et al.  Secret key generation from reciprocal spatially correlated MIMO channels , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[2]  A. Kraskov,et al.  Estimating mutual information. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[3]  Ueli Maurer,et al.  Secret-key agreement over unauthenticated public channels III: Privacy amplification , 2003, IEEE Trans. Inf. Theory.

[4]  Suela Kodra Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .

[5]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[6]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[7]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[8]  Stephan Ludwig,et al.  Secret key generation from static channels with untrusted relays , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[9]  Xudong Wang,et al.  Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.

[10]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[11]  Panlong Yang,et al.  SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Chen Sun,et al.  The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[13]  Xue Liu,et al.  Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[14]  Chen Da-jian On the Security of Fast Secret Key Generation Protocol with Virtual Channel Approach , 2015 .

[15]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[16]  Stephen W. Neville,et al.  Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation , 2012, IEEE Transactions on Information Forensics and Security.