A Note on the Information-Theoretic-(in)Security of Fading Generated Secret Keys

In this work we explore the security of secret keys generated via the electromagnetic reciprocity of the wireless fading channel. Identifying a new sophisticated colluding attack, we explore the information-theoretic-security for such keys in the presence of an all-powerful adversary constrained only by the laws of quantum mechanics. Specifically, we calculate the reduction in the conditional mutual information between transmitter and receiver that can occur when an adversary with unlimited computational and communication resources places directional antenna interceptors at chosen locations. Such locations, in principal, can be arbitrarily far from the intended receiver yet still influence the secret key rate. We show how, in principal, the key rate can be driven to zero. We then investigate how assumed limitations on an adversary's knowledge of transceiver positions can potentially restore some level of information-theoretic security. Finally, we compare our new results with the secret key rates anticipated from quantum-technology implementations that are deployed in next generation wireless networks under the assumption of an all-powerful adversary.

[1]  Seth Lloyd,et al.  Quantum cryptography approaching the classical limit. , 2010, Physical review letters.

[2]  H Vincent Poor,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[3]  Peng Ning,et al.  Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.

[4]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[5]  Gordon L. Stüber Principles of mobile communication , 1996 .

[6]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[7]  Norman C. Beaulieu,et al.  Novel Sum-of-Sinusoids Simulation Models for Rayleigh and Rician Fading Channels , 2006, IEEE Transactions on Wireless Communications.

[8]  Himanshu Tyagi,et al.  Multiterminal Secrecy by Public Discussion , 2016, Found. Trends Commun. Inf. Theory.

[9]  Robert A. Malaney Nuisance Parameters and Location Accuracy in Log-Normal Fading Models , 2007, IEEE Transactions on Wireless Communications.

[10]  Wenliang Du,et al.  Key Generation From Wireless Channels , 2013 .

[11]  Robert A. Malaney,et al.  The Quantum Car , 2015, IEEE Wireless Communications Letters.

[12]  Bing Qi,et al.  Practical challenges in quantum key distribution , 2016, npj Quantum Information.

[13]  Kyungwhoon Cheun,et al.  Millimeter-wave beamforming as an enabling technology for 5G cellular communications: theoretical feasibility and prototype results , 2014, IEEE Communications Magazine.

[14]  Weiqiang Sun,et al.  Hybrid Radio Frequency and Free Space Optical communication for 5G backhaul , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[15]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[16]  Athanasios V. Vasilakos,et al.  A Survey of Millimeter Wave (mmWave) Communications for 5G: Opportunities and Challenges , 2015, ArXiv.

[17]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[18]  Fei Hu,et al.  Opportunities in 5G Networks : A Research and Development Perspective , 2016 .

[19]  Robert A. Malaney,et al.  Quantum Entanglement Distribution Innext-Generation Wireless Communication Systems , 2016, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[20]  R. Clarke A statistical theory of mobile-radio reception , 1968 .

[21]  Robert Malaney,et al.  Gaussian entanglement distribution via satellite , 2014, 1410.1319.