Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa Channel

The existing scheme of secret key extraction based on the channel properties can be implemented in the three steps: quantization, information reconciliation and privacy amplification. Despite the tremendous researches of quantization and information reconciliation techniques, there is little consideration about the risk of information reconstruction by the unauthorized node due to the high correlation of subsequent quantization bits, which is unavoidably leaked on the public channel between quantization and information reconciliation. In this paper, we propose an improved scheme of secret key extraction with quantization randomness using Hadamard matrix on QuaDRiGa channel. Simulation results show that with this kind of quantization randomness, the correlation between the subsequent quantization bits can be significantly decreased, which can reduce the possibility of information reconstruction by the unauthorized node, and the improved scheme can increase the randomness of the final secret key bits as compared with the existing ones.

[1]  Werner Henkel,et al.  LDPC code construction for wireless physical-layer key reconciliation , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).

[2]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[3]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[4]  Andrew Thangaraj,et al.  LDPC-based secret key agreement over the Gaussian wiretap channel , 2006, 2006 IEEE International Symposium on Information Theory.

[5]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[6]  John McEachen,et al.  Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[7]  Christof Paar,et al.  Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .

[8]  Gerhard Wunder,et al.  A Novel Key Generating Architecture for Wireless Low-Resource Devices , 2014, 2014 International Workshop on Secure Internet of Things.