Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation

被引:32
作者
Qin, Dongrun [1 ]
Ding, Zhi [2 ]
机构
[1] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
[2] Univ Calif Davis, Dept Elect & Comp Engn, Davis, CA 95616 USA
基金
美国国家科学基金会;
关键词
Secret key; secure communications; non-reciprocal channels; MIMO transmission systems; training signals; eigenvalues; UNAUTHENTICATED PUBLIC CHANNELS; PHYSICAL LAYER SECURITY; PART II; AGREEMENT; TRANSMISSION;
D O I
10.1109/TIFS.2016.2594143
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional physical-layer (PHY)-based secret key generation schemes typically assume reciprocity of forward and reverse channels in order for facilitated shared secrecy. However, frequency-selective channels for frequency division duplex links as well as calibration difference of transceiver hardwares can invalidate reciprocity assumption and can cause severe key error floors between users. In this paper, we propose two practical PHY-based secret key generation schemes for multiple-input and multiple-output wireless links over non-reciprocal physical channels. One is pilot assistant secret key (PASKey) generation and the other is eigenvalue-based secret key (EVSKey) generation. In PASKey, both legitimate users estimate the same composite channel, while EVSKey exploits the properties of eigenvalues to generate secret bits. Both are effective against secrecy key theft by eavesdroppers. Furthermore, without adopting public training signals, EVSKey manages to generate secret bits even when nearby eavesdroppers collude. Our two schemes are shown to be more efficient and can achieve lower key error ratio than the existing methods.
引用
收藏
页码:2693 / 2705
页数:13
相关论文
共 39 条
[1]  
[Anonymous], 2010, RP47 3GPP RAN1
[2]  
[Anonymous], 2009, SP46 3GPP RAN1
[3]  
[Anonymous], 2014, P 11 USENIX S NETW S
[4]  
[Anonymous], 2002, R1020181 3GPP
[5]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]   Multiple-input-multiple-output measurements and modeling in Manhattan [J].
Chizhik, D ;
Ling, J ;
Wolniansky, PW ;
Valenzuela, RA ;
Costa, N ;
Huber, K .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2003, 21 (03) :321-331
[8]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[9]   Secrecy Generation for Multiple Input Multiple Output Channel Models [J].
Csiszar, Imre ;
Narayan, Prakash .
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, :2447-+
[10]   Impact of RF front-end impairments and mobility on channel reciprocity for closed-loop multiple antenna techniques [J].
Dias, AR ;
Bateman, D ;
Gosse, K .
2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, :1434-1438