Towards robust key extraction from multipath wireless channels

This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. We propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly, we investigate the effects of delay and mobility on the performance and we enhance the key generation mechanism accordingly. As a result, this paper presents a framework towards robust key generation from multipath wireless channels.

[1]  Michael A. Jensen,et al.  Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.

[2]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[3]  Stark C. Draper,et al.  A Secret Key Generation System Based on Multipath Channel Randomness: RSSI vs CSSI , 2011, ArXiv.

[4]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[5]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[6]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[7]  Serdar Sezginer,et al.  Fast varying channel estimation in downlink LTE systems , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[8]  Dieter Hogrefe,et al.  Intelligent mechanisms for key generation from multipath wireless channels , 2011, 2011 Wireless Telecommunications Symposium (WTS).

[9]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[10]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[11]  Sneha Kumar Kasera,et al.  Robust uncorrelated bit extraction methodologies for wireless sensors , 2010, IPSN '10.

[12]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[13]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[14]  Alex Reznik,et al.  On the Secrecy Capabilities of ITU Channels , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[15]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[16]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[17]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[18]  Rolf Oppliger,et al.  Contemporary cryptography , 2005, Artech House computer security series.

[19]  V. Erceg,et al.  TGn Channel Models , 2004 .

[20]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.