Efficient DCT-based secret key generation for the Internet of Things

Abstract Cryptography is one of the most widely employed means to ensure confidentiality in the Internet of Things (IoT). Establishing cryptographically secure links between IoT devices requires the prior consensus to a secret encryption key. Yet, IoT devices are resource-constrained and cannot employ traditional key distribution schemes. As a result, there is a growing interest in generating secret random keys locally, using the shared randomness of the communicating channel. This article presents a secret key generation scheme, named SKYGlow, which is targeted at resource-constrained IoT platforms and tested on devices that employ IEEE 802.15.4 radios. We first examine the practical upper bounds of the number of secret bits that can be extracted from a message exchange. We contrast these upper bounds with the current state-of-the-art, and elaborate on the workings of the proposed scheme. SKYGlow applies the Discrete Cosine Transform (DCT) on channel observations of exchanged messages to reduce mismatches and increase correlation between the generated secret bits. We validate the performance of SKYGlow in both indoor and outdoor scenarios, at 2.4 GHz and 868 MHz respectively. The results suggest that SKYGlow can create secret 128-bit keys of 0.9978 bits entropy with just 65 packet exchanges, outperforming the state-of-the-art in terms of energy efficiency.

[1]  Prakash Narayan,et al.  Secret key and private key constructions for simple multiterminal source models , 2005, ISIT.

[2]  Sneha Kumar Kasera,et al.  Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration , 2014, TOSN.

[3]  Ivan Martinovic,et al.  A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.

[4]  Geir M. Køien,et al.  Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[5]  Yao Liu,et al.  Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices , 2018, IEEE Trans. Inf. Forensics Secur..

[6]  Noel E. O'Connor,et al.  Energy-Efficient Hardware Architecture for Variable N-point 1D DCT , 2004, PATMOS.

[7]  Syed Taha Ali,et al.  Zero reconciliation secret key generation for body-worn health monitoring devices , 2012, WISEC '12.

[8]  Theodore Tryfonas,et al.  Privacy Leakage of Physical Activity Levels in Wireless Embedded Wearable Systems , 2017, IEEE Signal Processing Letters.

[9]  Alexandre J. Pierrot,et al.  Experimental aspects of secret key generation in indoor wireless environments , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[10]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[11]  Stephen W. Neville,et al.  Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).

[12]  Ueli Maurer,et al.  Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.

[13]  Rudolf Ahlswede,et al.  Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.

[14]  Sanjay Jha,et al.  DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).

[15]  Ankur Mehta,et al.  WARPWING: A complete open source control platform for miniature robots , 2010, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[16]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[17]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[18]  Antonio F. Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[19]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[20]  Paul Thomas,et al.  Low Throughput Networks for the IoT: Lessons learned from industrial implementations , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[21]  Xenofon Fafoutis,et al.  Physical layer secret-key generation with discreet cosine transform for the Internet of Things , 2017, 2017 IEEE International Conference on Communications (ICC).

[22]  Qin Wang,et al.  A Realistic Energy Consumption Model for TSCH Networks , 2014, IEEE Sensors Journal.

[23]  Liang Jin,et al.  High-rate secret key generation aided by multiple relays for Internet of Things , 2017 .

[24]  Sanjay Jha,et al.  Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.

[25]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..

[26]  Syed Taha Ali,et al.  Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[27]  Theodore S. Rappaport,et al.  Theory of multipath shape factors for small-scale fading wireless channels , 2000 .

[28]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[29]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[30]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[31]  Jinho Choi Secret key transmission for OFDM based machine type communications , 2017, Journal of Communications and Networks.

[32]  Theodore Tryfonas,et al.  Practical limits of the secret key-capacity for IoT physical layer security , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[33]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[34]  Niall Twomey,et al.  On-Board Feature Extraction from Acceleration Data for Activity Recognition , 2018, EWSN.

[35]  Jun Muramatsu,et al.  Secret-Key Distribution Based on Bounded Observability , 2015, Proceedings of the IEEE.

[36]  Inmaculada Tomeo-Reyes,et al.  Efficient high-rate key management technique for wireless body area networks , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).

[37]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[38]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.