Reverse piloting protocol for securing time varying wireless channels

We consider single-tone pilot based burst transmission over slow time varying flat fading wireless channels with no line of sight. We propose a reverse pilot signaling protocol, based on sending the pilot signal from the receiver to the transmitter instead of from the transmitter to the receiver and on channel tracking at the receiver. We show that the channel performs automatic symbol level encryption analogous to a shift cipher. We derive explicit relationships between channel and system parameters which guarantee secure transmission of the entire data burst for given channel conditions, and depict them for Rayleigh fading. The proposed protocol exhibits high key generating rates, and no overheads on key distribution, enciphering and deciphering. Its security strength increases with mobility. These properties make it a good candidate for mobile wireless systems where bandwidth and power resources are scarce, such as mobile wireless sensor networks and mobile ad-hoc networks.

[1]  Andrew J. Viterbi,et al.  Principles of coherent communication , 1966 .

[2]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[3]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[6]  P. Strevens Iii , 1985 .

[7]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[8]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[13]  Judith Kelner,et al.  Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[14]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[15]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[16]  Umberto Mengali,et al.  Synchronization Techniques for Digital Receivers , 1997, Applications of Communications Theory.

[17]  Dov Wulich,et al.  A physical transmission security layer for wireless multiple access communication systems , 2007, 2007 15th European Signal Processing Conference.

[18]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[19]  Ralph Howard,et al.  Data encryption standard , 1987 .

[20]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[21]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[22]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[23]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[24]  Marvin K. Simon,et al.  Spread Spectrum Communications Handbook , 1994 .

[25]  Sandeep Chennakeshu,et al.  Secure information transmission for mobile radio , 2000, IEEE Communications Letters.