A practical scheme for enhancing consistency and independence in wireless key generation for Wi-Fi networks

被引:0
作者
Wang, Jiangtao [1 ]
Hu, Aiqun [1 ,2 ]
Tian, Wanling [1 ]
Yu, Jiabao [2 ]
Chen, Xudong
机构
[1] Southeast Univ, Sch Informat Sci & Engn, Nanjing 211189, Jiangsu, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Jiangsu, Peoples R China
关键词
Physical layer security; Wireless key generation; Wi-Fi networks; Channel impulse response; CHANNEL STATE INFORMATION; OFDM SYSTEMS; SECURITY;
D O I
10.1016/j.phycom.2024.102508
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wi-Fi networks benefit from physical layer wireless key generation, a theoretically secure method for improving information transmission security. This paper introduces the Consistent Independent Key Generation (CIKG) scheme based on the Wi-Fi signal transmission model. It addresses the dual challenges of channel noise and virtual carrier low-pass effects. The scheme begins with extracting the channel frequency response (CFR) from the entire signal preamble, including both long and short symbols, followed by applying cubic spline interpolation to the short symbol-derived CFR to achieve fine-grained frequency fading corresponding to the long symbols. This refined CFR is averaged to bolster noise resistance, improving key consistency. Subsequently, the inverse Fourier transform is used to obtain the channel impulse response (CIR), and a deconvolution strategy reduces the impact of virtual carrier low-pass filtering on the multipath information of CIR, thus improving key independence. Implemented within Wi-Fi networks, the effectiveness of the CIKG scheme is rigorously tested across diverse scenarios. Quantitative evaluations indicate that the scheme substantially improves key consistency, achieving a 5 dB enhancement in signal-to-noise ratio over traditional CFR-based schemes and elevates information entropy by 20%, significantly boosting key independence. These advances affirm the potential of the CIKG scheme as a formidable solution for developing robust and secure wireless communication networks.
引用
收藏
页数:12
相关论文
共 42 条
[1]   Keystroke Recognition Using WiFi Signals [J].
Ali, Kamran ;
Liu, Alex X. ;
Wang, Wei ;
Shahzad, Muhammad .
MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, :90-102
[2]  
[Anonymous], 2021, IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016), P1, DOI [DOI 10.1109/IEEESTD.2021.9363693, 10.1109/ieeestd.2021.9363693]
[3]  
Avrahami T., 2023, P IEEE 20 INT C MOB, P471, DOI [10.1109/MASS58611.2023.00065, DOI 10.1109/MASS58611.2023.00065]
[4]  
Bassham L. E., 2010, Tech. Rep. 800-22 Rev 1a, DOI [10.6028/NIST.SP.800-22r1a, DOI 10.6028/NIST.SP.800-22R1A, 10.6028/nist.sp.800-22r1a]
[5]   CSI-RAShi: Distributed Key Generation for CSIDH [J].
Beullens, Ward ;
Disson, Lucas ;
Pedersen, Robi ;
Vercauteren, Frederik .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 :257-276
[6]  
Cheng L., 2015, 2015 INT C WIR COMM, DOI [10.1109/WCSP.2015.7341290, DOI 10.1109/WCSP.2015.7341290]
[7]   Combined intra symbol frequency domain averaging channel estimation for polarization division multiplexed coherent optical OFDM/OQAM systems [J].
Fang, Xi ;
Gao, Panpan ;
Zhou, He ;
Zhang, Song ;
Xu, Yueding ;
Xia, Yikai ;
Jin, Jifang .
OPTICAL FIBER TECHNOLOGY, 2023, 81
[8]  
Felkaroski N., 2019, SCC
[9]  
12th Int. ITG Conf. Syst. Commun. and Coding, P1, DOI [DOI 10.30420/454862049, 10.30420/454862049]
[10]   Cubic splines to model relationships between continuous variables and outcomes: a guide for clinicians [J].
Gauthier, J. ;
Wu, Q. V. ;
Gooley, T. A. .
BONE MARROW TRANSPLANTATION, 2020, 55 (04) :675-680