Abstract
In recent years, researchers have studied physical layer security (PLS) using unique radio propagation characteristics between two devices for extracting symmetric keys. However, the state of the art has following limitations: (a) paying attention to scenarios when devices are in communication ranges, and (b) considering only mobile devices. Secret key generation for devices which are not in communication ranges and for stationary nodes is a challenging task. In this work, we study the feasibility of generating secret keys between two devices which do not possess any direct link with the help of a trusted relay. We propose a novel key generation protocol for unreachable nodes, and a multi-level quantization mechanism. We implement our solution using off-the-shelf commercially available resource constrained devices suitable for IoT and wireless body area networks. We conduct an extensive set of experiments in indoor environments for various scenarios involving stationary and mobile nodes. Our results reveal that an eavesdropper cannot obtain sufficient useful information about the shared keys when at least any one of the three legitimate devices is mobile. The entropy of shared keys obtained between the legitimate devices ranges from ≈0.97 to 0.98 bit, which is very close to the highest entropy of binary key.
The work has been carried out by Dr. Chitra Javali and Dr. Girish Revadigar as a part of Post-doctoral Research at UNSW Sydney, Australia.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
If we do not assume Relay as a trusted node, active attacks such as man-in-the-middle (MITM) and Byzantine attack are possible. Security against active adversaries is a separate research problem which we do not address in this work.
References
Cisco: The Internet of Things, Whitepaper, Apr. 2011
C. Javali, G. Revadigar, Birds of a feather flock together: fuzzy extractor and gait-based robust group secret key generation for smart wearables, in Proceedings of EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2018
G. Revadigar, C. Javali, W. Xu, A.V. Vasilakos, W. Hu, S. Jha, Accelerometer and fuzzy vault-based secure group key generation and sharing protocol for smart wearables. IEEE Trans. IEEE Trans. Inf. Forensics Secur. 12(10), 2467–2482 (2017)
S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, Radio-telepathy: extracting a secret key from an unauthenticated wireless channel, in Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), 2008
G. Revadigar, C. Javali, W. Hu, S. Jha, DLINK: dual link based radio frequency fingerprinting for wearable devices, in Proceedings of the IEEE International Conference on Local Computer Networks (LCN), 2015
C. Javali, G. Revadigar, L. Libman, S. Jha, SeAK: secure authentication and key generation protocol based on dual antennas for wireless body area networks, in Proceedings of the Workshop on RFID Security (RFIDsec), 2014
G. Revadigar, C. Javali, H. Asghar, K. Rasmussen, S. Jha, Mobility independent secret key generation for wearable health-care devices, in Proceedings of the EAI International Conference on Body Area Networks (BodyNets), 2015
G. Revadigar, C. Javali, W. Xu, W. Hu, S. Jha, Secure key generation and distribution protocol for wearable devices, in Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom) Work in Progress, 2016)
G. Revadigar, C. Javali, H. Asghar, K. Rasmussen, S. Jha, Secret key generation for body-worn devices by inducing artificial randomness in the channel. Technical Report UNSW-CSE-TR-201506, UNSW Australia, 2015
B. Azimi-Sadjadi, A. Kiayias, A. Mercado, B. Yener, Robust key generation from signal envelopes in wireless networks, in Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2007
K. Zeng, Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun. Mag. 53(6), 33–39 (2015)
R. Ahlswede, I. Csiszar, Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans. Inf. Theory 39(4), 1121–1132 (1993)
U.M. Maurer, Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733–742 (1993)
H. Liu, Y. Wang, J. Yang, Y. Chen, Fast and practical secret key extraction by exploiting channel response, in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Apr. 2013
S.N. Premnath, S. Jana, J. Croft, P.L. Gowda, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)
R. Wilson, D. Tse, R.A. Scholtz, Channel identification: secret sharing using reciprocity in ultrawideband channels. Trans. Inf. Forensics Secur. 2(3), 364–375 (2007)
S. Mathur, R. Miller, A. Varshavsky, W. Trappe, N. Mandayam, ProxiMate: proximity-based secure pairing using ambient wireless signals, in Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 2011
T. Shimizu, H. Iwai, H. Sasaoka, Physical-layer secret key agreement in two-way wireless relaying systems. IEEE Trans. Inf. Forensics Secur. 6(3), 650–660 (2011)
L. Lai, Y. Liang, W. Du, Cooperative key generation in wireless networks. IEEE J. Sel. Areas Commun. 30(8), 1578–1588 (2012)
L. Lai, Y. Liang, W. Du, PHY-based cooperative key generation in wireless networks, in Proceedings of the Annual Allerton Conference on Communication, Control, and Computing (Allerton), Sept. 2011, pp. 662–669
Q. Wang, K. Xu, K. Ren, Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE J. Sel. Areas Commun. 30(9), 1666–1674 (2012)
H. Zhou, L.M. Huie, L. Lai, Secret key generation in the two-way relay channel with active attackers. IEEE Trans. Inf. Forensics Secur. 9(3), 476–488 (2014)
C.D.T. Thai, J. Lee, T.Q.S. Quek, Physical-layer secret key generation with colluding untrusted relays. IEEE Trans. Wirel. Commun. 15(2), 1517–1530 (2016)
N. Wang, N. Zhang, T.A. Gulliver, Cooperative key agreement for wireless networking: key rates and practical protocol design. IEEE Trans. Inf. Forensics Secur. 9(2), 272–284 (2014)
T.X. Vu, P. Duhamel, M.D. Renzo, On the diversity of network-coded cooperation with decode-and-forward relay selection. IEEE Trans. Wirel. Commun. 14(8), 4369–4378 (2015)
V.N.Q. Bao, N. Linh-Trung, M. Debbah, Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 12(12), 6076–6085 (2013)
C.D.T. Thai, P. Popovski, E. de Carvalho, F. Sun, Diversity-multiplexing trade-off for coordinated direct and relay schemes. IEEE Trans. Wirel. Commun. 12(7), 3289–3299 (2013)
L. Shi, J. Yuan, S. Yu, M. Li, ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks, in Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2013
L. Lai, S.W. Ho, Key generation algorithms for pairwise independent networks based on graphical models. IEEE Trans. Inf. Theory 61(9), 4828–4837 (2015)
C. Javali, G. Revadigar, M. Ding, S. Jha, Secret key generation by virtual link estimation, in Proceedings of the EAI International Conference on Body Area Networks (BodyNets), Sept. 2015
W.C. Jakes, Microwave Mobile Communications (Wiley, Hoboken, 1972)
S. Zhang, S.C. Liew, P.P. Lam, Physical-layer network coding, in Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), no. 8, 2006
S.N. Premnath, S. Jana, J. Croft, P.L. Gowda, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)
G. Brassard, L. Salvail, Secret-key reconciliation by public discussion, in EUROCRYPT, no. 14 (Springer, New York, 1994), pp. 410–423
C.H. Bennett, G. Brassard, C. Crepeau, U.M. Maurer, Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915–1923 (1995)
S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, On the effectiveness of secret key extraction from wireless signal strength in real environments, in Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), 2009
NIST, A statistical test suite for random and pseudorandom number generators for cryptographic applications, 2010
X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, W. Zhuang, Exploiting prediction to enable secure and reliable routing in wireless body area networks, in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2012
Acknowledgment
This work is partially supported by Australian Research Council Discovery grant DP150100564.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Javali, C., Revadigar, G., Ding, M., Lin, Z., Jha, S. (2021). Cooperative Physical Layer Secret Key Generation by Virtual Link Estimation. In: Le, K.N. (eds) Physical Layer Security. Springer, Cham. https://doi.org/10.1007/978-3-030-55366-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-55366-1_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-55365-4
Online ISBN: 978-3-030-55366-1
eBook Packages: EngineeringEngineering (R0)