Physical-Layer Key Generation Supported by RECAP Antenna Structures

Physical-layer key generation makes use of the reciprocity of wireless time-division duplex (TDD) channels. Both transmission directions experience the same channel, apart from independent noise and quantization effects. The randomness of a mobile channel ensures a certain regeneration rate of keys. Reconfigurable antennas, so-called RECAPs, offer a possibility to also provide randomness in the extreme case when both transmitter and receiver are not moving, even have a line-ofsight connection. RECAP structures and the steps for obtaining a reliably identical and secure key on both sides are discussed.

[1]  G.S. Smith,et al.  A reconfigurable aperture antenna based on switched links between electrically small metallic patches , 2004, IEEE Transactions on Antennas and Propagation.

[2]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[3]  R. Mehmood,et al.  MIMO Capacity Enhancement Using Parasitic Reconfigurable Aperture Antennas (RECAPs) , 2012, IEEE Transactions on Antennas and Propagation.

[4]  Werner Henkel,et al.  LDPC code construction for wireless physical-layer key reconciliation , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).

[5]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[6]  Ming Jiang,et al.  Slepian-Wolf Coding for Reconciliation of Physical Layer Secret Keys , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Jon W. Wallace Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.

[9]  R. Mehmood,et al.  On the Accuracy of Equivalent Circuit Models for Multi-Antenna Systems , 2012, IEEE Transactions on Antennas and Propagation.

[10]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[11]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[12]  Ueli Maurer,et al.  Linking information reconciliation and privacy amplification , 1997, Journal of Cryptology.

[13]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[14]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[15]  Rashid Mehmood,et al.  Diminishing Returns With Increasing Complexity in Reconfigurable Aperture Antennas , 2010, IEEE Antennas and Wireless Propagation Letters.

[16]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.