Blind channel estimation based robust physical layer key generation in MIMO networks

An emerging area of interest in wireless security is the generation of secret encryption keys by leveraging the features of the physical propagation channel. The shared randomness of the wireless channel between two legitimate nodes in a communication network is exploited to provide strong secrecy. The secret keys are generated based on fluctuations or evolution of the wireless channel state. However, to the best of our knowledge, little work has been performed on algorithms to exploit the increased randomness available to wireless nodes equipped with MIMO antennas. In this paper, we present a practical key generation scheme for MIMO channels based on quantization performed on blind channel estimates. Our schemes generate random keys for transmitter and receiver by simultaneously quantizing the blind channel estimates. Our schemes are simulated for a realistic fading channel model, and performance metrics for error rate and efficiency are provided.

[1]  M. J. Gans,et al.  On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..

[2]  Jwo-Yuh Wu,et al.  Statistical Covariance-matching based Blind Channel Estimation for Zero-padding MIMO-OFDM Systems , 2009, ISCAS.

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[6]  Sandeep Chennakeshu,et al.  Secure information transmission for mobile radio , 2000, IEEE Communications Letters.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[9]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[10]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[11]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..