On Quantization for Secret Key Generation From Wireless Channel Samples

Physical layer security (PLS) techniques hold promise for augmenting secure communications in the 5th generation of mobile wireless networks. Secret key generation (SKG) is a PLS technique which exploits the wireless propagation channel’s randomness to generate symmetric key bits for information encryption and decryption. This work proposes symmetric key generation based on non-uniform quantization of the received signal strength (RSS) samples of a Nakagami- $m$ fading channel. The proposed strategy for non-uniform quantization for SKG aims to set quantization thresholds for maximal key randomness and high values of key generation rate (KGR) and key agreement probability (KAP). Finally, a framework is proposed to use single node RSS measurements, readily available in the literature, to generate RSS samples at the other link end. This framework facilitates the testing of new SKG algorithms that require simultaneous RSS measurements by the legitimate nodes, which are not readily available in the open literature. The effectiveness of the proposed SKG scheme is validated through Monte Carlo methods and the National Institute of Standards and Technology (NIST) test suite for assessing the randomness of the generated key sequence.

[1]  Xiaoming Xu,et al.  A Two-Layer Secure Quantization Algorithm for Secret Key Generation With Correlated Eavesdropping Channel , 2019, IEEE Access.

[2]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[3]  Martin Kraus,et al.  Evaluation of Physical Layer Secret Key Generation for IoT Devices , 2019, 2019 IEEE 20th Wireless and Microwave Technology Conference (WAMICON).

[4]  Furqan Jameel,et al.  Secure Communications in Three-Step Two-Way Energy Harvesting DF Relaying , 2018, IEEE Communications Letters.

[5]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[6]  Abhay Kumar,et al.  Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging , 2019, Phys. Commun..

[7]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[8]  Xianbin Wang,et al.  Integrating PHY Security Into NDN-IoT Networks By Exploiting MEC: Authentication Efficiency, Robustness, and Accuracy Enhancement , 2019, IEEE Transactions on Signal and Information Processing over Networks.

[9]  Wirawan,et al.  An Efficient Key Generation for the Internet of Things Based Synchronized Quantization , 2019, Sensors.

[10]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[11]  Furqan Jameel,et al.  On the Secrecy Performance of SWIPT Receiver Architectures with Multiple Eavesdroppers , 2018, Wirel. Commun. Mob. Comput..

[12]  Mathini Sellathurai,et al.  Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[13]  Alfred O. Hero,et al.  Secure space-time communication , 2003, IEEE Trans. Inf. Theory.

[14]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[15]  Jianfeng Ma,et al.  Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks , 2017, IEEE Access.

[16]  Tony Q. S. Quek,et al.  Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Transactions on Wireless Communications.

[17]  Xinyi Huang,et al.  An Adaptive Secret Key Establishment Scheme in Smart Home Environments , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[18]  Honggang Wang,et al.  Integrated Node Authentication and Key Distribution Method for Body Area Network , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).

[19]  John McEachen,et al.  Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[20]  Biao Han,et al.  LoRa-Based Physical Layer Key Generation for Secure V2V/V2I Communications , 2020, Sensors.

[21]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[22]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[23]  Shurjeel Wyne,et al.  Spatial Modeling of Interference in Inter-Vehicular Communications for 3-D Volumetric Wireless Networks , 2020, IEEE Access.

[24]  Moustafa Youssef,et al.  Keys Through ARQ: Theory and Practice , 2011, IEEE Transactions on Information Forensics and Security.

[25]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[26]  Fernando Perez Fontan,et al.  Modelling the Wireless Propagation Channel: A simulation approach with MATLAB , 2008 .

[27]  Furqan Jameel,et al.  Secrecy Outage for Wireless Sensor Networks , 2017, IEEE Communications Letters.

[28]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead , 2017, IEEE Transactions on Wireless Communications.

[29]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[30]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[31]  Shree Krishna Sharma,et al.  Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future , 2019, IEEE Access.

[32]  Dieter Hogrefe,et al.  Intelligent mechanisms for key generation from multipath wireless channels , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[33]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[34]  Andrei Gurtov,et al.  Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.

[35]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[36]  Michael A. Jensen,et al.  Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.

[37]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[38]  Xian Liu Outage Probability of Secrecy Capacity over Correlated Log-Normal Fading Channels , 2013, IEEE Communications Letters.

[39]  Michael McGuire,et al.  Channel Estimation for Secret Key Generation , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[40]  Roger Woods,et al.  Physical Layer Security for the Internet of Things: Authentication and Key Generation , 2019, IEEE Wireless Communications.

[41]  Edgar Talavera,et al.  A Review of Security Aspects in Vehicular Ad-Hoc Networks , 2019, IEEE Access.

[42]  Cagatay Candan,et al.  The moment function for the ratio of correlated generalized gamma variables , 2013 .

[43]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[44]  Aiqun Hu,et al.  Secret Key Generation Scheme Based on the Channel Covariance Matrix Eigenvalues in FDD Systems , 2019, IEEE Communications Letters.

[45]  Vijay Devabhaktuni,et al.  An Upper Bound on PHY-Layer Key Generation for Secure Communications Over a Nakagami-M Fading Channel With Asymmetric Additive Noise , 2018, IEEE Access.