Fast secret key generation based on dynamic private pilot from static wireless channels

In static or quasi-static wireless channel environments, secret key generation (SKG) based on wireless channels is vulnerable to active attacks due to the openness and invariance of public pilot, especially man-in-the-middle (MITM) attacks, where attacker acts as a transparent relay to manipulate channel measurements and derive the generated keys. In order to fight against this attack, a dynamic private pilot is designed, where both private pilot and secret key are derived from the characteristics of wireless channels and private to third party. In static or quasi-static environments, we use singular value decomposition techniques to reconstitute the wireless channels to improve the randomness of the wireless channels. Private pilot can encrypt and authenticate the wireless channels, which can make channel state information intercepted by MITM attacker reduced to zero and the SKG rate close to that without attacks. Results of analysis and simulation show the proposed SKG scheme can withdraw the MITM attacks.

[1]  Zoltán Szabó,et al.  Information theoretical estimators toolbox , 2014, J. Mach. Learn. Res..

[2]  Ivan Martinovic,et al.  A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.

[3]  Dongtang Ma,et al.  Secret key generation via random beamforming in stationary environment , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[5]  Rudolf Ahlswede,et al.  Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.

[6]  Na Li,et al.  The full-duplex artificial noise scheme for security of a cellular system , 2015 .

[7]  Qimei Cui,et al.  Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.

[8]  George K. Karagiannidis,et al.  Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Rose Qingyang Hu,et al.  Energy-Efficient NOMA Heterogeneous Cloud Radio Access Networks : Enabling Techniques and Challenges , 2016 .

[10]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[13]  Holger Boche,et al.  Secret-Key Generation Using Compound Sources and One-Way Public Communication , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Amir Beck,et al.  A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..

[15]  Fuhui Zhou,et al.  Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT , 2016, IEEE Transactions on Wireless Communications.