Impact of Realistic Propagation Conditions on Reciprocity-Based Secret-Key Capacity

Secret-key generation exploiting the channel reciprocity between two legitimate parties is an interesting alternative solution to cryptographic primitives for key distribution in wireless systems as it does not rely on an access infrastructure and provides information-theoretic security. Many works in the literature assume that the eavesdropper gets no side information about the key from her observations provided that: (i) it is spaced more than a wavelength away from a legitimate party and (ii) the channel is rich enough in scattering. In this paper, we show that this condition is not always verified under realistic propagation conditions and we study the resulting secret-key capacity.

[1]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[2]  Trung-Hien Nguyen,et al.  CSI-based versus RSS-based Secret-Key Generation under Correlated Eavesdropping , 2020 .

[3]  Gordon L. Stüber Principles of mobile communication , 1996 .

[4]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[5]  Stark C. Draper,et al.  Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness , 2010, 2010 IEEE International Symposium on Information Theory.

[6]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[7]  Don H. Johnson,et al.  Array Signal Processing: Concepts and Techniques , 1993 .

[8]  Klaus I. Pedersen,et al.  Power azimuth spectrum in outdoor environments , 1997 .

[9]  Aydin Sezgin,et al.  The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[10]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[11]  Qian Xu,et al.  Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.

[12]  Alexandre J. Pierrot,et al.  Experimental aspects of secret key generation in indoor wireless environments , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[13]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[14]  Michael A. Jensen,et al.  Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.

[15]  Liesbet Van der Perre,et al.  Modeling the channel time-variance for fixed wireless communications , 2002, IEEE Communications Letters.

[16]  Xiaodai Dong,et al.  Verification of Secret Key Generation from UWB Channel Observations , 2009, 2009 IEEE International Conference on Communications.

[17]  Raymond W. Yeung,et al.  A new outlook of Shannon's information measures , 1991, IEEE Trans. Inf. Theory.

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Matthieu Bloch,et al.  Secret Sharing over Fast-Fading MIMO Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[20]  Junqing Zhang,et al.  On the Key Generation From Correlated Wireless Channels , 2017, IEEE Communications Letters.

[21]  Gregory D. Durgin,et al.  Space-Time Wireless Channels , 2002 .

[22]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[23]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[24]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[25]  Eduard A. Jorswieck,et al.  Secret key generation from reciprocal spatially correlated MIMO channels , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).