On the using of discrete wavelet transform for physical layer key generation

被引:30
作者
Zhan, Furui [1 ]
Yao, Nianmin [1 ]
机构
[1] Dalian Univ Technol, Sch Comp Sci & Technol, Dalian, Peoples R China
关键词
Key generation; Wireless channel reciprocity; Discrete wavelet transform; Gray code;
D O I
10.1016/j.adhoc.2017.06.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For key generation between wireless transceivers, key generation leveraging channel reciprocity is a promising alternative to public key cryptography. Several existing schemes have validated its feasibility in real environments. However, in some scenarios, channel measurements collected by the involved transceivers are highly correlated but not identical, i.e., measurement sequences of these transceivers have too many discrepancies, which makes it difficult to extract the shared key from these measurements. In this paper, we propose a scheme to achieve secret key generation from wireless channels. During the proposed scheme, to reduce the amount of the referred discrepancies and further achieve efficient key generation, the involved transceivers separately apply a compressor based on the discrete wavelet transform (DWT) to pre-process their measurements. Then, multi-level quantization is implemented to quantify the output of DWT-based compressor. An encoding scheme based on gray code is employed to establish bit sequence and ensure that the resulting bit mismatch rate can be further reduced so that efficient information reconciliation can be implemented. Accordingly, the shared key between these transceivers can be derived after information reconciliation. Finally, 2-universal hash functions are used to guarantee the randomness of the shared secret key. Several experiments in real environments are conducted to validate the proposed scheme. The results demonstrate that the proposed scheme is available to generate shared secret keys between transceivers even though their measurement sequences have too many discrepancies. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:22 / 31
页数:10
相关论文
共 27 条
[1]  
Badawy A, 2015, IEEE VTS VEH TECHNOL
[2]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[3]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35]
[4]   Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage [J].
Chou, Tzu-Han ;
Draper, Stark C. ;
Sayeed, Akbar M. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1751-1764
[5]  
Croft J, 2010, PROCEEDINGS OF THE 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, P70
[6]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[7]   Secrecy Outage Capacity of Fading Channels [J].
Gungor, Onur ;
Tan, Jian ;
Koksal, Can Emre ;
El-Gamal, Hesham ;
Shroff, Ness B. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (09) :5379-5397
[8]   Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels [J].
Haroun, Mohamed F. ;
Gulliver, T. Aaron .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) :1764-1775
[9]   On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments [J].
Jana, Suman ;
Premnath, Sriram Nandha ;
Clark, Mike ;
Kasera, Sneha K. ;
Patwari, Neal ;
Krishnamurthy, Srikanth V. .
FIFTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM 2009), 2009, :321-332
[10]   Secure information transmission for mobile radio [J].
Koorapaty, H ;
Hassan, A ;
Chennakeshu, S .
1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, :381-381