Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging

Abstract Achieving information security in the Internet of things (IoT) by means of physical layer key generation is an open research area. In the key generation, the secret key is generated using the physical (PHY) layer characteristics of the communication channel as a source of randomness. IoT networks are characterized as noisy & heterogeneous networks with lower transmission power. In this paper, we propose a wireless secret key generation approach by pre-processing the received signal strength indicator (RSSI) of beacons exchanged between Alice and Bob using moving window averaging (MWA). Our proposed approach has significant improvement in performance, at lower SNR range. The size of the moving window is selected on the basis of improvement in the standard deviation of the RSSI pattern. It is also suggested to quantize the pre-processed RSS samples through Lloyd–Max based quantizer to minimize quantization error, which further improves bit disagreement (BDR). It is clear from results that the proposed approach has considerable improvement in bit disagreement rate (BDR) at low SNR by applying the selected window size. The performance of the proposed approach is also evaluated by performing randomness testing of the generated keys using National Institute of Standards and Technology (NIST) test set for randomness.

[1]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[2]  Ting Jiang,et al.  Physical-layer security in Internet of Things based on compressed sensing and frequency selection , 2017, IET Commun..

[3]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[4]  Yuexing Peng,et al.  Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels , 2017, IEEE Transactions on Wireless Communications.

[5]  Prasant Mohapatra,et al.  Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.

[6]  Michael A. Jensen,et al.  Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.

[7]  Jun Li,et al.  Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.

[8]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[9]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[10]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[11]  Daniele Trinchero,et al.  Secret key generation based on channel and distance measurements , 2014, 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[12]  Joel Max,et al.  Quantizing for minimum distortion , 1960, IRE Trans. Inf. Theory.

[13]  Michael A. Jensen,et al.  Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.

[14]  Fang Sheng,et al.  A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video Coding , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[15]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[16]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[17]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[20]  Sneha Kumar Kasera,et al.  Secret key extraction using Bluetooth wireless signal strength measurements , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[21]  Jie Yang,et al.  Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[22]  Daniele Trinchero,et al.  Secret Key Generation Based on AoA Estimation for Low SNR Conditions , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[23]  Nianmin Yao,et al.  On the using of discrete wavelet transform for physical layer key generation , 2017, Ad Hoc Networks.

[24]  Tim Güneysu,et al.  Information reconciliation schemes in physical-layer security: A survey , 2016, Comput. Networks.

[25]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[26]  Jun Li,et al.  Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios , 2018, IEEE Communications Magazine.

[27]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[28]  Raksha Upadhyay,et al.  Internet of Things and Wireless Physical Layer Security: A Survey , 2017 .

[29]  Hisato Iwai,et al.  Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.

[30]  Balasubramaniam Natarajan,et al.  Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.

[31]  Werner Henkel,et al.  LDPC code construction for wireless physical-layer key reconciliation , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).

[32]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.