Golay Code Based Bit Mismatch Mitigation for Wireless Channel Impulse Response Based Secrecy Generation

The wireless radio communications channel between two legitimate user terminals has long been considered as a renewable source of shared secrecy. As characterization of the channel, the time-varying channel impulse response (CIR) is commonly used for this purpose due to its reciprocity and inherent difficulty in being captured by an adversary. While each terminal generates a secret key at its side, based on its own channel measurements combined with an independent noise component, mismatches may occur in the extracted information or in the obtained bit sequences after a sampling and quantization process. To mitigate such bit mismatches, we propose a method that utilizes the properties of the Golay code to correct or detect the bit mismatches for CIR-based secret key agreement. In our approach, the reconciliation information in the transmission is deliberately designed to hide the original shared information (perfect or imperfect). The correctness of our bit mismatch mitigation algorithm is thoroughly analyzed for all possible scenarios. In addition, the effectiveness of our algorithm is validated through simulations using MATLAB for generated CIR data, the results of which match our theoretical analysis. Our design is shown to be secure and optimal by security analysis and comparisons between our proposed algorithm and its variants. The comparisons with related techniques and the scenarios in which our design can benefit are also discussed.

[1]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[2]  Ming Li,et al.  MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks , 2015, IEEE Internet of Things Journal.

[3]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[4]  Dariush Divsalar,et al.  Turbo code performance as a function of code block size , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[5]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[6]  Hyeong-Ah Choi,et al.  Securing smart home: Technologies, security challenges, and security requirements , 2014, 2014 IEEE Conference on Communications and Network Security.

[7]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[8]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[9]  Sneha Kumar Kasera,et al.  Advancing wireless link signatures for location distinction , 2008, MobiCom '08.

[10]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[11]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[12]  Alex Reznik,et al.  On the Secrecy Capabilities of ITU Channels , 2007, 2007 IEEE 66th Vehicular Technology Conference.

[13]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[14]  Xiang-Yang Li,et al.  Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.

[15]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[16]  Tim Güneysu,et al.  Information reconciliation schemes in physical-layer security: A survey , 2016, Comput. Networks.

[17]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[18]  Ignas G. Niemegeers,et al.  IEEE 802.11ah: Advantages in standards and further challenges for sub 1 GHz Wi-Fi , 2012, 2012 IEEE International Conference on Communications (ICC).