Vulnerabilities of Physical Layer Secret Key Generation Against Environment Reconstruction Based Attacks

This letter investigates the security of physical layer secret key generation in highly reconfigurable scattering environments. Based on our derived secret key capacity expression, we show that the eavesdropper’s accurate knowledge of surrounding environments and propagation laws can significantly decrease the secret key capacity, i.e., the security of keys does not only rely on the channel correlation. We term this new physical layer attack as Environment Reconstruction based Attack for SEcret keys (ERASE) and provide a practical application of this attack based on a generalized 3D channel model. Finally, the impact of crucial parameters related to the channel scattering conditions is analyzed through simulation results, and useful insights for the secure and practical design of physical layer key generation are highlighted.

[1]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[2]  Weidong Wang,et al.  On the 3-D MIMO channel model based on regular-shaped geometry-based stochastic model , 2015, 2015 International Symposium on Antennas and Propagation (ISAP).

[3]  Junqing Zhang,et al.  On the Key Generation From Correlated Wireless Channels , 2017, IEEE Communications Letters.

[4]  Zhisheng Niu,et al.  Learning-Based Remote Channel Inference: Feasibility Analysis and Case Study , 2019, IEEE Transactions on Wireless Communications.

[5]  B. Ai,et al.  Characterization of Quasi-Stationarity Regions for Vehicle-to-Vehicle Radio Channels , 2015, IEEE Transactions on Antennas and Propagation.

[6]  E. Veronica Belmega,et al.  Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches , 2017, IEEE Transactions on Information Forensics and Security.

[7]  Syed Taha Ali,et al.  Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.

[8]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[9]  Aggelos Kiayias,et al.  On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.

[10]  Jie Yang,et al.  Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.

[11]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[12]  Tony Q. S. Quek,et al.  Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.

[13]  Yuexing Peng,et al.  Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels , 2017, IEEE Transactions on Wireless Communications.

[14]  Rong Jin,et al.  Physical layer key agreement under signal injection attacks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).