Secret Key Generation Using Physical Channels with Imperfect CSI

Providing extra security in wireless communication networks using channel impulse response as a source of common randomness is an appealing direction in prospective systems. While some theoretical and experimental work has demonstrated its potential, a number of issues remain unexplored. This paper is concerned with the reliability of secret key generation under practical estimation requirements. We provide an analytical expression which relates the channel SNRs and degree of reciprocity to probability of key mismatch. In the next step we show how this affects key reconciliation and secrecy leaking. Finally, we consider how quantization with a protective band can help to trade the secret key rate for increased reliability and security of the scheme.

[1]  H. Vincent Poor,et al.  A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.

[2]  Kareem E. Baddour,et al.  On Achievable Data Rates and Optimal Power Allocation in Fading Channels with Imperfect Channel State Information , 2009, Wirel. Pers. Commun..

[3]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[4]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[5]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[6]  Mohamed-Slim Alouini,et al.  Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .

[7]  Wayne E. Stark,et al.  Characterization of WSSUS channels: normalized mean square covariance and diversity combining , 2005, IEEE Transactions on Wireless Communications.

[8]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[9]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[10]  J. Cavers An analysis of pilot symbol assisted modulation for Rayleigh fading channels (mobile radio) , 1991 .

[11]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[12]  Alex B. Gershman,et al.  Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals , 2006, IEEE Transactions on Signal Processing.