Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting

Advances in physical layer security techniques have increasingly demonstrated their potential to replace security functionalities that are traditionally included in the upper layers of the Open Systems Interconnection model. This has made it possible for devices with limited layer structures or/and restricted hardware components to offer security measures. In this paper, we consider spatial modulation (SM) systems and propose a unique physical layer technique that uses a random constellation mapping criterion for secret key exchange. The principle idea here is to exploit the inherent symbol-antenna mapping feature of the SM technique to encode the secret key. Specifically, a random phase shift is imposed on each of the modulated symbols using a channel driven approach to uniquely authenticate the transmitted key bits or/and the encrypted confidential data. The results demonstrate that the proposed technique is superior to benchmark techniques in terms of computational complexity and key bit error rate. It will also be shown that the proposed technique offers greater flexibility in terms of the authentication process preference, which is normally unattainable in most of the key exchange proposed techniques.

[1]  Chen-Mou Cheng,et al.  Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.

[2]  Jitendra K. Tugnait,et al.  Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[4]  P. Grant,et al.  Spatial modulation for multiple-antenna wireless systems: a survey , 2011, IEEE Communications Magazine.

[5]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[6]  Larry J. Greenstein,et al.  Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.

[7]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[8]  Emanuele Viterbo,et al.  Signal Space Diversity: A Power- and Bandwidth-Efficient Diversity Technique for the Rayleigh Fading Channel , 1998, IEEE Trans. Inf. Theory.

[9]  Lajos Hanzo,et al.  A Scalable Performance–Complexity Tradeoff for Constellation Randomization in Spatial Modulation , 2017, IEEE Transactions on Vehicular Technology.

[10]  Aydin Sezgin,et al.  Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.

[11]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[12]  Michael A. Jensen,et al.  Bound on the Key Establishment Rate for Multi-Antenna Reciprocal Electromagnetic Channels , 2014, IEEE Transactions on Antennas and Propagation.

[13]  Harald Haas,et al.  Bit Error Probability of SM-MIMO Over Generalized Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[14]  Michael A. Jensen,et al.  Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.

[15]  Marco Gruteser,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio , 2022 .

[16]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[17]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[18]  Yi Hong,et al.  Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.

[19]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[20]  Emad Alsusa,et al.  Secret Key Exchange Using Private Random Precoding in MIMO FDD and TDD Systems , 2017, IEEE Transactions on Vehicular Technology.

[21]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[22]  Emad Alsusa,et al.  Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing , 2017, IET Inf. Secur..

[23]  Nuwan S. Ferdinand,et al.  Physical Layer Secrecy Performance of TAS Wiretap Channels with Correlated Main and Eavesdropper Channels , 2014, IEEE Wireless Communications Letters.

[24]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[25]  Richard E. Blahut Modem Theory: An Introduction to Telecommunications , 2009 .

[26]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[27]  Christos Masouros Improving the Diversity of Spatial Modulation in MISO Channels by Phase Alignment , 2014, IEEE Communications Letters.

[28]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[29]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[30]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[31]  Lajos Hanzo,et al.  Constellation Randomization Achieves Transmit Diversity for Single-RF Spatial Modulation , 2016, IEEE Transactions on Vehicular Technology.

[32]  Stark C. Draper,et al.  Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage , 2013, IEEE Journal on Selected Areas in Communications.

[33]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).