A survey on secret key generation mechanisms on the physical layer in wireless networks

被引:48
作者
Shehadeh, Youssef El Hajj [1 ]
Hogrefe, Dieter [1 ]
机构
[1] Univ Gottingen, Inst Comp Sci, D-37073 Gottingen, Germany
关键词
physical layer security; key generation; wireless multipath channel; RSSI; CIR; DOMAIN SCALAR RESPONSE; RANDOMNESS; AGREEMENT; CHANNELS; SCHEMES;
D O I
10.1002/sec.973
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional security mechanisms are mainly based on the distribution of shared secret keys. Yet, this task is nontrivial in large wireless networks, because of mobility and scalability issues. Recently, it has been found that some properties of the physical layer of wireless communications can be leveraged for the purpose of secret key generation. In particular, the wireless channel has been investigated as a common source of secrecy to generate a shared secret key. We explore the most recent approaches in this area. Received signal strength indicator based key generation is firstly investigated. After that, we present some of the most recent approaches of key generation based on the channel impulse response. Moreover, we discuss some other physical layer methods. Thus, this paper provides a survey on the latest key generation mechanisms on the physical layer of wireless communications.Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:332 / 341
页数:10
相关论文
共 66 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
Alfandi O., 2011, P 4 IFIP INT C NEW T, P1
[3]  
[Anonymous], 2002, 1402 FIPS PUB
[4]  
[Anonymous], 2005, USER EQUIPMENT UE RA
[5]   Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels [J].
Aono, T ;
Higuchi, K ;
Ohira, T ;
Komiyama, B ;
Sasaoka, H .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (11) :3776-3784
[6]  
Aono T, 2005, EURO WIREL TECHNOL C, P173
[7]   Robust Key Generation from Signal Envelopes in Wireless Networks [J].
Azimi-Sadjadi, Babak ;
Kiayias, Aggelos ;
Mercado, Alejandra ;
Yener, Bulent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :401-+
[8]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[9]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[10]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229