SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference

被引:63
作者
Chen, Dajiang [1 ]
Qin, Zhen [1 ,2 ]
Mao, Xufei [3 ]
Yang, Panlong [4 ]
Qin, Zhiguang
Wang, Ruijin [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Commun & Informat Engn, Chengdu 611731, Peoples R China
[3] Tsinghua Univ, Sch Software & TNLIST, Beijing 100083, Peoples R China
[4] PLA Univ Sci & Technol, Inst Commun Engn, Nanjing 210007, Jiangsu, Peoples R China
基金
中国博士后科学基金;
关键词
Secret key generation; artificial interference; physical layer security; wireless security; SECRET COMMUNICATION; CHANNEL; RANDOMNESS; SECURITY;
D O I
10.1109/TIFS.2013.2278834
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Leveraging a wireless multipath channel as the source of common randomness, many key generation methods have been proposed according to the information-theory security. However, existing schemes suffer a low generation rate and a low entropy, and mainly rely on nodes' mobility. To overcome this limitation, we present a key generation protocol with known artificial interference, named SmokeGrenade, a new physical-layer approach for secret key generation in a narrowband fading channel. Our scheme utilizes artificial interference to contribute to the change of measured values on channel states. Our theoretical analysis shows that the key generation rate increases with the increment of the interference power. Particularly, the achievable key rate of SmokeGrenade gains three times better than that of the traditional key generation schemes when the average interference power is normalized to 1. Simulation results also demonstrate that SmokeGrenade achieves a higher generation rate and entropy compared with some state-of-the-art approaches.
引用
收藏
页码:1731 / 1745
页数:15
相关论文
共 34 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]   Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels [J].
Aono, T ;
Higuchi, K ;
Ohira, T ;
Komiyama, B ;
Sasaoka, H .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (11) :3776-3784
[3]   Robust Key Generation from Signal Envelopes in Wireless Networks [J].
Azimi-Sadjadi, Babak ;
Kiayias, Aggelos ;
Mercado, Alejandra ;
Yener, Bulent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :401-+
[4]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35]
[5]  
Çapar Ç, 2012, IEEE INFOCOM SER, P1152, DOI 10.1109/INFCOM.2012.6195474
[6]  
Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
[7]  
Croft J, 2010, PROCEEDINGS OF THE 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, P70
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[10]  
Dong L, 2009, 2009 IEEE/SP 15TH WORKSHOP ON STATISTICAL SIGNAL PROCESSING, VOLS 1 AND 2, P417, DOI [10.1109/SSP.2009.5278549, 10.1109/EIT.2009.5189653]