High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements

被引:303
作者
Patwari, Neal [1 ]
Croft, Jessica [1 ]
Jana, Suman [2 ]
Kasera, Sneha Kumar [2 ]
机构
[1] Univ Utah, Dept Elect & Comp Engn, Salt Lake City, UT 84112 USA
[2] Univ Utah, Sch Comp, Salt Lake City, UT 84112 USA
基金
美国国家科学基金会;
关键词
Wireless networks; multipath fading; physical layer; cryptography; key generation; AGREEMENT;
D O I
10.1109/TMC.2009.88
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropper at a third location. This paper addresses bit extraction, i.e., the extraction of secret key bits from noisy radio channel measurements at two nodes such that the two secret keys reliably agree. Problems include 1) nonsimultaneous directional measurements, 2) correlated bit streams, and 3) low bit rate of secret key generation. This paper introduces high-rate uncorrelated bit extraction (HRUBE), a framework for interpolating, transforming for decorrelation, and encoding channel measurements using a multibit adaptive quantization scheme which allows multiple bits per component. We present an analysis of the probability of bit disagreement in generated secret keys, and we use experimental data to demonstrate the HRUBE scheme and to quantify its experimental performance. As two examples, the implemented HRUBE system can achieve 22 bits per second at a bit disagreement rate of 2.2 percent, or 10 bits per second at a bit disagreement rate of 0.54 percent.
引用
收藏
页码:17 / 30
页数:14
相关论文
共 27 条
[1]   Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels [J].
Aono, T ;
Higuchi, K ;
Ohira, T ;
Komiyama, B ;
Sasaoka, H .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (11) :3776-3784
[2]   Robust Key Generation from Signal Envelopes in Wireless Networks [J].
Azimi-Sadjadi, Babak ;
Kiayias, Aggelos ;
Mercado, Alejandra ;
Yener, Bulent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :401-+
[3]  
BENNETT CL, 1992, J ACQ IMMUN DEF SYND, V5, P1
[4]   Wireless Device Identification with Radiometric Signatures [J].
Brik, Vladimir ;
Banerjee, Suman ;
Gruteser, Marco ;
Oh, Sangho .
MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, :116-+
[5]  
Durgin G.D., 2002, SPACE TIME WIRELESS, V1st
[6]  
Farrow C.W., 1998, Proc. of IEEE Inter. Symp. on Circ. and Systems, P2641
[7]  
Greenemeier L., 2007, SCI AM OCT
[8]   Cryptographic key agreement for mobile radio [J].
Hassan, AA ;
Stark, WE ;
Hershey, JE ;
Chennakeshu, S .
DIGITAL SIGNAL PROCESSING, 1996, 6 (04) :207-212
[9]   UNCONVENTIONAL CRYPTOGRAPHIC KEYING VARIABLE MANAGEMENT [J].
HERSHEY, JE ;
HASSAN, AA ;
YARLAGADDA, R .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1995, 43 (01) :3-6
[10]  
Hines WW, 2003, Probability and statistics in engineering