Extract Secrets from Wireless Channel: A New Shape-based Approach

Existing secret key extraction techniques use quantization to map wireless channel amplitudes to secret bits. This pa- per shows that such techniques are highly prone to environ- ment and local noise effects: They have very high mismatch rates between the two nodes that measure the channel be- tween them. This paper advocates using the shape of the channel instead of the size (or amplitude) of the channel. It shows that this new paradigm shift is significantly ro- bust against environmental and local noises. We refer to this shape-based technique as Puzzle. Implementation in a software-defined radio (SDR) platform demonstrates that Puzzle has a 63% reduction in bit mismatch rate than the state-of-art frequency domain approach (CSI-2bit). Exper- iments also show that unlike the state-of-the-art received signal strength (RSS)-based methods like ASBG, Puzzle is robust against an attack in which an eavesdropper can pre- dict the secret bits using planned movements.

[1]  W. Cleveland Robust Locally Weighted Regression and Smoothing Scatterplots , 1979 .

[2]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[3]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[5]  Theodore S. Rappaport,et al.  Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .

[6]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[7]  H. Mannila,et al.  Computing Discrete Fréchet Distance ∗ , 1994 .

[8]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[9]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[10]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[11]  Xiaodai Dong,et al.  Verification of Secret Key Generation from UWB Channel Observations , 2009, 2009 IEEE International Conference on Communications.

[12]  Alex Reznik,et al.  On the Secrecy Capabilities of ITU Channels , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[13]  Suhas N. Diggavi,et al.  Creating secrets out of erasures , 2013, MobiCom.

[14]  Moe Z. Win,et al.  Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.

[15]  Lin Cai,et al.  Secret Key Generation and Agreement in UWB Communication Channels , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.