The role of channel states in secret key generation

In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delay-based attack, that observing its own channel states is not the only way an adversary can learn about the channel states of the legitimate communicating parties. The attack suggests that it is not secure to transmit data via the channel whose states generate secret keys. However, not using the channel at all would result in a waste of bandwidth. Hence, we propose using this channel to transmit the bits needed to reconcile the channel state estimates at the transmitter and the receiver. This is a necessary step in secret key generation that required a separate channel in previous work. Although the scheme proposed here in effect prohibits the use of an adaptive transmitter, we show, for the Rayleigh fading channel, that a decent key rate that outperforms existing schemes is obtained. This is due to the fact that collection of the channel state information and transmission of the reconciliation bits are performed concurrently rather than via time sharing.

[1]  Mohammad Reza Aref,et al.  Rate regions of secret key sharing in a new source model , 2011, IET Commun..

[2]  Vinod M. Prabhakaran,et al.  Secrecy via sources and channels — A secret key - Secret message rate tradeoff region , 2008, 2008 IEEE International Symposium on Information Theory.

[3]  G. Caire,et al.  On the capacity of some channels with channel state information , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[4]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[5]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[6]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[7]  Pravin Varaiya,et al.  Capacity of fading channels with channel side information , 1997, IEEE Trans. Inf. Theory.

[8]  Abbas El Gamal,et al.  Wiretap Channel With Causal State Information , 2012, IEEE Transactions on Information Theory.

[9]  Suhas N. Diggavi,et al.  Secret key agreement using asymmetry in channel state knowledge , 2009, 2009 IEEE International Symposium on Information Theory.

[10]  Alexander Barg,et al.  Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.

[11]  Suhas N. Diggavi,et al.  Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.

[12]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[13]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[14]  Aaron D. Wyner,et al.  Channels with Side Information at the Transmitter , 1993 .