Retrodirective-Assisted Secure Wireless Key Establishment

In this paper, a new type of architecture for secure wireless key establishment is proposed. A retrodirective array (RDA) that is configured to receive and re-transmit at different frequencies is utilized as a relay node. The RDA is able to respond in “real time,” reducing the required number of time slots to two. More importantly, in this architecture, equivalent reciprocal wireless channels between legitimate keying nodes can be randomly updated within one channel coherence time period, leading to greatly increased key generation rates in slow fading environment. The secrecy performance of this RDA-assisted key generation system is evaluated under several eavesdropping strategies and it is shown that it outperforms previous relay key generation systems.

[1]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[2]  Prasant Mohapatra,et al.  Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.

[3]  A. Kraskov,et al.  Estimating mutual information. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[4]  Stephen W. Neville,et al.  Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[6]  Junqing Zhang,et al.  Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.

[7]  Balasubramaniam Natarajan,et al.  MIMO-Based Secret Key Generation Strategies: Rate Analysis , 2014, Int. J. Mob. Comput. Multim. Commun..

[8]  Mohsen Guizani,et al.  Unleashing the secure potential of the wireless physical layer: Secret key generation methods , 2016, Phys. Commun..

[9]  Vincent Fusco,et al.  Modulation Insensitive PLL for Tracking Antenna Applications , 2015 .

[10]  Maarten van der Vorst,et al.  SATCOM Retrodirective Array , 2016, IEEE Transactions on Microwave Theory and Techniques.

[11]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[12]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[13]  V.F. Fusco,et al.  A high performance analogue retrodirective phase conjugation circuit with RX array factor combination ability , 2011, 2011 IEEE MTT-S International Microwave Symposium.

[14]  Pedro Pinho,et al.  Smart Surfaces: Large Area Electronics Systems for Internet of Things Enabled by Energy Harvesting , 2014, Proceedings of the IEEE.

[15]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[16]  Tim Güneysu,et al.  Information reconciliation schemes in physical-layer security: A survey , 2016, Comput. Networks.

[17]  Vincent Fusco,et al.  Improved physical layer secure wireless communications using a directional modulation enhanced retrodirective array , 2014, 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS).

[18]  Marco Gruteser,et al.  Random channel hopping schemes for key agreement in wireless networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[19]  Vincent Fusco,et al.  Developments in retrodirective array technology , 2013 .

[20]  Panlong Yang,et al.  SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[22]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[23]  V. Erceg,et al.  TGn Channel Models , 2004 .

[24]  H. Sasaoka,et al.  Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM , 2008, 2008 International Symposium on Information Theory and Its Applications.

[25]  Tian Ling Zhang,et al.  Overview on the Phase Conjugation Techniques of the Retrodirective Array , 2010 .

[26]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[27]  Jingjing Huang,et al.  Secret Key Generation Exploiting Ultra-wideband Indoor Wireless Channel Characteristics , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[28]  Syed Taha Ali,et al.  Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[29]  V. Fusco,et al.  Phase conjugating circuit with frequency offset beam pointing error correction facility for precision retrodirective antenna applications , 2011, 2011 8th European Radar Conference.

[30]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[31]  Geoffrey Ye Li,et al.  Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, IEEE Trans. Commun..

[32]  V. Fusco,et al.  Bi-static 5.8GHz RFID range enhancement using retrodirective techniques , 2011, 2011 41st European Microwave Conference.

[33]  Michael A. Jensen,et al.  Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.

[34]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[35]  Hisato Iwai,et al.  Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.

[36]  V. Fusco,et al.  Analysis and characterization of PLL-based retrodirective array , 2005, IEEE Transactions on Microwave Theory and Techniques.

[37]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[38]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[39]  Ting Jiang,et al.  Physical layer secret key generation scheme used in 60 GHz band , 2014 .

[40]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[41]  Xudong Wang,et al.  Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.

[42]  Sneha Kumar Kasera,et al.  Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration , 2014, TOSN.

[43]  Marco Gruteser,et al.  Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[44]  William Stallings,et al.  Cryptography and network security , 1998 .

[45]  Yuan Ding,et al.  Experimental study on channel reciprocity in wireless key generation , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[46]  Sanjay Jha,et al.  Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.

[47]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[48]  Christof Paar,et al.  Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.

[49]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[50]  Paul V. Brennan An experimental and theoretical study of self-phased arrays in mobile satellite communications , 1989 .

[51]  Sanjay Jha,et al.  Secret Key Generation by Virtual Link Estimation , 2015, BODYNETS.

[52]  Qian Xu,et al.  Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.