Secret keys from entangled sensor motes: implementation and analysis

Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and compromise necessitate the use of an on-line key generation, where secret keys are generated by the nodes themselves. However, the cost of such schemes is high since their secrecy is based on computational complexity. Recently, several research contributions justified that the wireless channel itself can be used to generate information-theoretic secure keys between two parties. By exchanging sampling messages during movement, a bit string can be derived that is only known to the involved entities. Yet, movement is not the only possibility to generate randomness. The channel response is also strongly dependent on the frequency of the transmitted signal. In our work, we introduce a protocol for key generation based on the frequency-selectivity of channel fading. The great practical advantage of this approach is that we do not rely on node movement as the source of randomness. Thus, the frequent case of a sensor network with static motes is supported. Furthermore, the error correction property of the proposed protocol mitigates the effects of measurement errors and other temporal effects, giving rise to a key agreement rate of over 97%. We show the applicability of our protocol by implementing it on MICAz motes, and evaluate its robustness and secrecy through experiments and analysis.

[1]  J. Filliben The Probability Plot Correlation Coefficient Test for Normality , 1975 .

[2]  Prashant Krishnamurthy,et al.  Modeling of indoor positioning systems based on location fingerprinting , 2004, IEEE INFOCOM 2004.

[3]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[4]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[5]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[6]  Ueli Maurer,et al.  Unbreakable Keys from Random Noise , 2007 .

[7]  Peter Grassberger,et al.  Entropy estimation of symbol sequences. , 1996, Chaos.

[8]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[9]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[11]  Jens B. Schmitt,et al.  On key agreement in wireless sensor networks based on radio transmission properties , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.

[12]  Chuan Heng Foh,et al.  A practical path loss model for indoor WiFi positioning enhancement , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[13]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[14]  M. R. Titchener,et al.  How well do practical information measures estimate the Shannon entropy , 2006 .

[15]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .