Secret key agreement based on a communication through wireless MIMO fading channels

The method of key sharing between a mobile unit and a base station through a wireless MIMO-based fading channel is investigated. The description of a key distribution protocol is given. The expression to estimate the correct key bit agreement based on the use of guard interval is proved. Statistical properties of the key string are tested using the NIST criteria. Impossibility of key string eavesdropping by illegal users is guaranteed due to small values of correlation between legal and eavesdropper carrier phases. Numerical examples show that the MIMO system with 8 antennas is able to agree 256 bits with a reliability value 0.99 for SNR equal to 35 dB. This experiment confirms that the MIMO scenario is especially effective for secret key distribution.

[1]  Daniele Micciancio Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.

[2]  A. Land,et al.  An Automatic Method for Solving Discrete Programming Problems , 1960, 50 Years of Integer Programming.

[3]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[4]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[5]  W. C. Jakes,et al.  Microwave Mobile Communications , 1974 .

[6]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[7]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[8]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[9]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[10]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[11]  Roy D. Yates,et al.  Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[12]  Bo Ai,et al.  Assessment of LTE-R Using High Speed Railway Channel Model , 2011, 2011 Third International Conference on Communications and Mobile Computing.

[13]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[14]  Martin E. Hellman,et al.  A note on Wyner's wiretap channel (Corresp.) , 1977, IEEE Trans. Inf. Theory.

[15]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[16]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[17]  Adnan Kavak,et al.  Analytical Derivation of 2×2 MIMO Channel Capacity in Terms of Multipath Angle Spread and Signal Strength , 2012 .

[18]  Guillermo Morales-Luna,et al.  Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna , 2011, ArXiv.

[19]  Oded Regev,et al.  Lattice-Based Cryptography , 2006, CRYPTO.

[20]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[21]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[22]  Krishnamoorthy Iyer Broadcast channel with confidential messages and secret keys , 2016, 2016 Twenty Second National Conference on Communication (NCC).

[23]  Guillermo Morales-Luna,et al.  Wire-tap channel concept in nature and society , 2014, IISA 2014, The 5th International Conference on Information, Intelligence, Systems and Applications.

[24]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[25]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[26]  Jochen Schiller,et al.  Mobile Communications , 1996, IFIP — The International Federation for Information Processing.

[27]  Stark C. Draper,et al.  Secret key generation through OFDM multipath channel , 2011, 2011 45th Annual Conference on Information Sciences and Systems.