Physical layer key generation in wireless networks: challenges and opportunities

Physical layer key generation that exploits reciprocity and randomness of wireless fading channels has attracted considerable research attention in recent years. Although theoretical study has shown its potential to generate information- theoretic secure keys, great challenges remain when transforming the theory into practice. This article provides an overview of the physical layer key generation process and discusses its practical challenges. Different passive and active attacks are analyzed and evaluated through numerical study. A new key generation scheme using random probing signals, and combining user generated randomness and channel randomness, is introduced as a countermeasure against active attacks. The numerical results show that the proposed scheme achieves higher security strength than existing schemes using constant probing signals under active attacks. Future research topics on physical layer key generation are discussed.

[1]  Prasant Mohapatra,et al.  Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.

[2]  Syed Taha Ali,et al.  Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.

[3]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[4]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[5]  Vinod M. Prabhakaran,et al.  Secrecy via Sources and Channels , 2008, IEEE Transactions on Information Theory.

[6]  Mudhakar Srivatsa,et al.  Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.

[7]  Jie Yang,et al.  Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.

[8]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[9]  Suhas N. Diggavi,et al.  Creating secrets out of erasures , 2013, MobiCom.

[10]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[11]  Aggelos Kiayias,et al.  On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.

[12]  Ivan Martinovic,et al.  A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.

[13]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[14]  Rong Jin,et al.  Practical Secret Key Agreement for Full-Duplex Near Field Communications , 2014, IEEE Transactions on Mobile Computing.

[15]  Rong Jin,et al.  Practical Secret Key Agreement for Full-Duplex Near Field Communications , 2016, IEEE Trans. Mob. Comput..

[16]  Ayan Banerjee,et al.  PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.