Secrecy Extraction from Increased Randomness in a Time-Variant MIMO Channel

This paper proposes a practical protocol useful for establishing encryption keys between nodes in a wireless network. The method is designed to enable creation of long keys by extracting the increased randomness inherent in reciprocal time-variant multiple-input multiple-output wireless channels. The presentation provides a strategy for exploiting the degrees of freedom existing in the protocol to decorrelate the information in the public discussion from the key information as well as the channel state information. The paper further discusses several error reduction techniques that can efficiently enhance key agreement between the multiple-antenna nodes. Simulations based on a realistic time-variant channel model demonstrate the efficiency of the key establishment as well as the probability of key agreement for the protocol.

[1]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[2]  Michael A. Jensen,et al.  Modeling the statistical time and angle of arrival characteristics of an indoor multipath channel , 2000, IEEE Journal on Selected Areas in Communications.

[3]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[4]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[5]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[6]  David J. C. MacKay,et al.  Encyclopedia of Sparse Graph Codes , 1999 .

[7]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[8]  Zixiang Xiong,et al.  Compression of binary sources with side information at the decoder using LDPC codes , 2002, IEEE Communications Letters.

[9]  Heinz Kres Statistical Tables for Multivariate Analysis: A Handbook with References to Applications , 1983 .

[10]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[11]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[12]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[13]  Chan Chen,et al.  Modeling time-variant multipath characteristics for MIMO channels , 2008, 2008 IEEE Antennas and Propagation Society International Symposium.

[14]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..