Secret key generation based on channel and distance measurements

Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key generation algorithm based on two reciprocal physical layer parameters; the channel measurements and the distances between the two communicating nodes. The two parameters are estimated experimentally using implementations of our algorithm on three FPGA-based WARP kits emulating the two communicating nodes and the eavesdropper. The parameters are used as common sources of randomness to generate the secret key. We evaluate the performance of our algorithm through extensive iterations. We compare the bit mismatch rate as well as the entropy of the generated secret key of our algorithm versus classical channel only and distance only based algorithms. Our results reveal that even in the worst case scenarios, our algorithm outperforms the two other algorithms and overcomes their vulnerabilities.

[1]  G.S. Smith,et al.  A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.

[2]  Sneha Kumar Kasera,et al.  Mobility Assisted Secret Key Generation Using Wireless Link Signatures , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  Li Tan,et al.  Digital Signal Processing: Fundamentals and Applications , 2013 .

[4]  Raida Al Alawi RSSI based location estimation in wireless sensors networks , 2011, ICON.

[5]  G.B. Giannakis,et al.  Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks , 2005, IEEE Signal Processing Magazine.

[6]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[7]  C.L. Law,et al.  BA–POC-Based Ranging Method With Multipath Mitigation , 2005, IEEE Antennas and Wireless Propagation Letters.

[8]  Andreas F. Molisch,et al.  Wireless Communications , 2005 .

[9]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[10]  Alfred O. Hero,et al.  Using proximity and quantized RSS for sensor localization in wireless networks , 2003, WSNA '03.

[11]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[12]  Robert A. Scholtz,et al.  Ranging in a dense multipath environment using an UWB radio link , 2002, IEEE J. Sel. Areas Commun..

[13]  Hisashi Kobayashi,et al.  Analysis of wireless geolocation in a non-line-of-sight environment , 2006, IEEE Transactions on Wireless Communications.

[14]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Moe Z. Win,et al.  Fundamental Limits of Wideband Localization— Part I: A General Framework , 2010, IEEE Transactions on Information Theory.

[16]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[17]  Can Emre Koksal,et al.  Secret key generation from mobility , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[18]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[19]  Moe Z. Win,et al.  Fundamental Limits of Wideband Localization— Part II: Cooperative Networks , 2010, IEEE Transactions on Information Theory.

[20]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[22]  Laurence Mailaender,et al.  On the Geolocation Bounds for Round-Trip Time-of-Arrival and All Non-Line-of-Sight Channels , 2008, EURASIP J. Adv. Signal Process..

[23]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[24]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.