Improving Quantization for Channel Reciprocity based Key Generation

Quantization, and the fact that channel characteristics are independent and identically distributed so far have received only little attention in reports about actual implementations of physical layer key generation schemes. They are merely assumed for channel reciprocity based key generation, although the secret key generation significantly relies on them.We set out to design a quantization preprocessing as well as an online quantization scheme which favours i.i.d. and uniform distribution of the generated values to achieve high entropy and key rates, and calculate the resulting mutual information between communication partners in a large, realistic measurement study. Our experiments indicate a remarkable increase in mutual information, and underline the applicability to various quantization and key generation schemes.

[1]  Steven W. Smith,et al.  The Scientist and Engineer's Guide to Digital Signal Processing , 1997 .

[2]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[3]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[4]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[5]  S. Gezici,et al.  Ranging in the IEEE 802.15.4a Standard , 2006, 2006 IEEE Annual Wireless and Microwave Technology Conference.

[6]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[7]  Wenliang Du,et al.  Key Generation From Wireless Channels , 2013 .

[8]  David Wetherall,et al.  Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.

[9]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[10]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[11]  Christof Paar,et al.  Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .

[12]  Mohamed R. Mahfouz,et al.  Adaptive leading-edge detection in UWB indoor localization , 2010, 2010 IEEE Radio and Wireless Symposium (RWS).

[13]  Christof Paar,et al.  Exploiting the Physical Environment for Securing the Internet of Things , 2015, NSPW '15.

[14]  T. Ohira,et al.  Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme , 2005, The European Conference on Wireless Technology, 2005..

[15]  Renato Renner,et al.  An intuitive proof of the data processing inequality , 2011, Quantum Inf. Comput..

[16]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[17]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[18]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[19]  Michael Randolph Garey,et al.  The complexity of the generalized Lloyd - Max problem , 1982, IEEE Trans. Inf. Theory.

[20]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[21]  Junqing Zhang,et al.  Secure key generation from OFDM subcarriers' channel responses , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[22]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[23]  John McEachen,et al.  Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[24]  Chung Chan,et al.  Multivariate Mutual Information Inspired by Secret-Key Agreement , 2015, Proceedings of the IEEE.

[25]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[26]  J. Kinney,et al.  Equitability, mutual information, and the maximal information coefficient , 2013, Proceedings of the National Academy of Sciences.