Due to the enormous spreading of applied wireless networks, security is actually one of the most important issues for telecommunications. One of the main issue in the field of securing wireless information exchanging is the initial common knowledge between source and destination. A shared secret is normally mandatory in order to decide the encryption (algorithm or code or key) of the information stream. It is usual to exchange this common a priori knowledge by using a "secure" channel. Now a days a secure wireless channel is not possible. In fact normally the common a priori knowledge is already established (but this is not secure) or by using a non-radio channel (that implies a waste of time and resource). This contribution deals with the proposal of a new modulation technique ensuring secure communication in a full wireless environment. The information is modulated, at physical layer, by the thermal noise experienced by the link between two terminals. A loop scheme is designed for unique recovering of mutual information. The probability of error/detection is analytically derived for the legal users and for the third unwanted listener. The proposed scheme has also been implemented in a Xilinx Virtex II FPGA.
All the results show that the performance of the proposed scheme yields the advantage of intrinsic security, i.e., the mutual information cannot be physically demodulated (passive attack) or denied (active attack) by a third terminal, leading us to conclude that the proposed technique is really useful for private key distribution in every wireless network.
[1]
Alfred O. Hero,et al.
Secure space-time communication
,
2003,
IEEE Trans. Inf. Theory.
[2]
Imre Csiszár,et al.
Broadcast channels with confidential messages
,
1978,
IEEE Trans. Inf. Theory.
[3]
Luca Simone Ronga,et al.
A New Modulation for Intrinsically Secure Radio Channel in Wireless Systems
,
2009,
Wirel. Pers. Commun..
[4]
A. D. Wyner,et al.
The wire-tap channel
,
1975,
The Bell System Technical Journal.
[5]
U. Maurer,et al.
Secret key agreement by public discussion from common information
,
1993,
IEEE Trans. Inf. Theory.
[6]
Ansi Ieee,et al.
Part11 : Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications
,
1999
.
[7]
Stephen T. Kent,et al.
Security Architecture for the Internet Protocol
,
1998,
RFC.
[8]
Hugo Krawczyk,et al.
A Security Architecture for the Internet Protocol
,
1999,
IBM Syst. J..
[9]
Claude E. Shannon,et al.
Communication theory of secrecy systems
,
1949,
Bell Syst. Tech. J..
[10]
P. Strevens.
Iii
,
1985
.