Threat on Physical Layer Security: Side Channel vs. Wiretap Channel

被引:4
作者
Luo, Peng [1 ]
Li, Huiyun [2 ]
Xu, Guoqing [2 ]
Peng, Lei [2 ]
机构
[1] Chinese Acad Sci, Grad Univ, Inst Software, Beijing 100049, Peoples R China
[2] Chinese Acad Sci, Chinese Univ Hong Kong, Shenzhen Inst Adv Technol, Shenzhen 518055, Peoples R China
来源
2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013) | 2013年
关键词
Physical layer security; channel state information (CSI); wiretap channel; side-channel analysis; SECRET; RECIPROCITY; GENERATION;
D O I
10.1109/CSE.2013.54
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The location-specific channel state information can be exploited to generate secret keys for wireless system services, In the multipath wireless environment. Its secrecy capacity was usually studied with the wiretap channel model. This paper proposes a side channel model which is even more threatening to the security of the physical layer randomness based secret keys. We present the information-theoretic analysis of the side channel model, and compare it with the wire-tap model. The analysis indicates that the secret key capacity of the side-channel will be lower than that of the wire-tap channel, especially with a fading scenario. We conduct MATLAB simulation of physical layer randomness based key generation and SPICE simulation of key extraction to observe the side channel leakage of the circuit. The simulation results confirm the consistency of the key bits, thus verifying the feasibility of our proposed side-channel attack scheme against the physical layer security.
引用
收藏
页码:295 / 300
页数:6
相关论文
共 31 条
[1]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[2]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[3]  
[Anonymous], 2006, Elements of Information Theory
[4]  
[Anonymous], 2006 INT C COMM TECH
[5]   Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels [J].
Aono, T ;
Higuchi, K ;
Ohira, T ;
Komiyama, B ;
Sasaoka, H .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (11) :3776-3784
[6]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[7]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[8]  
Gallager R. G., 1968, Information Theory and Reliable Communication, V2
[9]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[10]  
Hamida S. T., P 3 INT C NEW TECHN