Skip to main content

Cooperative Physical Layer Secret Key Generation by Virtual Link Estimation

  • Chapter
  • First Online:
Physical Layer Security

Abstract

In recent years, researchers have studied physical layer security (PLS) using unique radio propagation characteristics between two devices for extracting symmetric keys. However, the state of the art has following limitations: (a) paying attention to scenarios when devices are in communication ranges, and (b) considering only mobile devices. Secret key generation for devices which are not in communication ranges and for stationary nodes is a challenging task. In this work, we study the feasibility of generating secret keys between two devices which do not possess any direct link with the help of a trusted relay. We propose a novel key generation protocol for unreachable nodes, and a multi-level quantization mechanism. We implement our solution using off-the-shelf commercially available resource constrained devices suitable for IoT and wireless body area networks. We conduct an extensive set of experiments in indoor environments for various scenarios involving stationary and mobile nodes. Our results reveal that an eavesdropper cannot obtain sufficient useful information about the shared keys when at least any one of the three legitimate devices is mobile. The entropy of shared keys obtained between the legitimate devices ranges from ≈0.97 to 0.98 bit, which is very close to the highest entropy of binary key.

The work has been carried out by Dr. Chitra Javali and Dr. Girish Revadigar as a part of Post-doctoral Research at UNSW Sydney, Australia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    If we do not assume Relay as a trusted node, active attacks such as man-in-the-middle (MITM) and Byzantine attack are possible. Security against active adversaries is a separate research problem which we do not address in this work.

References

  1. Cisco: The Internet of Things, Whitepaper, Apr. 2011

    Google Scholar 

  2. C. Javali, G. Revadigar, Birds of a feather flock together: fuzzy extractor and gait-based robust group secret key generation for smart wearables, in Proceedings of EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2018

    Google Scholar 

  3. G. Revadigar, C. Javali, W. Xu, A.V. Vasilakos, W. Hu, S. Jha, Accelerometer and fuzzy vault-based secure group key generation and sharing protocol for smart wearables. IEEE Trans. IEEE Trans. Inf. Forensics Secur. 12(10), 2467–2482 (2017)

    Article  Google Scholar 

  4. S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, Radio-telepathy: extracting a secret key from an unauthenticated wireless channel, in Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), 2008

    Google Scholar 

  5. G. Revadigar, C. Javali, W. Hu, S. Jha, DLINK: dual link based radio frequency fingerprinting for wearable devices, in Proceedings of the IEEE International Conference on Local Computer Networks (LCN), 2015

    Google Scholar 

  6. C. Javali, G. Revadigar, L. Libman, S. Jha, SeAK: secure authentication and key generation protocol based on dual antennas for wireless body area networks, in Proceedings of the Workshop on RFID Security (RFIDsec), 2014

    Google Scholar 

  7. G. Revadigar, C. Javali, H. Asghar, K. Rasmussen, S. Jha, Mobility independent secret key generation for wearable health-care devices, in Proceedings of the EAI International Conference on Body Area Networks (BodyNets), 2015

    Google Scholar 

  8. G. Revadigar, C. Javali, W. Xu, W. Hu, S. Jha, Secure key generation and distribution protocol for wearable devices, in Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom) Work in Progress, 2016)

    Google Scholar 

  9. G. Revadigar, C. Javali, H. Asghar, K. Rasmussen, S. Jha, Secret key generation for body-worn devices by inducing artificial randomness in the channel. Technical Report UNSW-CSE-TR-201506, UNSW Australia, 2015

    Google Scholar 

  10. B. Azimi-Sadjadi, A. Kiayias, A. Mercado, B. Yener, Robust key generation from signal envelopes in wireless networks, in Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2007

    Google Scholar 

  11. K. Zeng, Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun. Mag. 53(6), 33–39 (2015)

    Article  Google Scholar 

  12. R. Ahlswede, I. Csiszar, Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans. Inf. Theory 39(4), 1121–1132 (1993)

    Article  MathSciNet  Google Scholar 

  13. U.M. Maurer, Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733–742 (1993)

    Article  MathSciNet  Google Scholar 

  14. H. Liu, Y. Wang, J. Yang, Y. Chen, Fast and practical secret key extraction by exploiting channel response, in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Apr. 2013

    Google Scholar 

  15. S.N. Premnath, S. Jana, J. Croft, P.L. Gowda, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)

    Article  Google Scholar 

  16. R. Wilson, D. Tse, R.A. Scholtz, Channel identification: secret sharing using reciprocity in ultrawideband channels. Trans. Inf. Forensics Secur. 2(3), 364–375 (2007)

    Article  Google Scholar 

  17. S. Mathur, R. Miller, A. Varshavsky, W. Trappe, N. Mandayam, ProxiMate: proximity-based secure pairing using ambient wireless signals, in Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), 2011

    Google Scholar 

  18. T. Shimizu, H. Iwai, H. Sasaoka, Physical-layer secret key agreement in two-way wireless relaying systems. IEEE Trans. Inf. Forensics Secur. 6(3), 650–660 (2011)

    Article  Google Scholar 

  19. L. Lai, Y. Liang, W. Du, Cooperative key generation in wireless networks. IEEE J. Sel. Areas Commun. 30(8), 1578–1588 (2012)

    Article  Google Scholar 

  20. L. Lai, Y. Liang, W. Du, PHY-based cooperative key generation in wireless networks, in Proceedings of the Annual Allerton Conference on Communication, Control, and Computing (Allerton), Sept. 2011, pp. 662–669

    Google Scholar 

  21. Q. Wang, K. Xu, K. Ren, Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE J. Sel. Areas Commun. 30(9), 1666–1674 (2012)

    Article  Google Scholar 

  22. H. Zhou, L.M. Huie, L. Lai, Secret key generation in the two-way relay channel with active attackers. IEEE Trans. Inf. Forensics Secur. 9(3), 476–488 (2014)

    Article  Google Scholar 

  23. C.D.T. Thai, J. Lee, T.Q.S. Quek, Physical-layer secret key generation with colluding untrusted relays. IEEE Trans. Wirel. Commun. 15(2), 1517–1530 (2016)

    Article  Google Scholar 

  24. N. Wang, N. Zhang, T.A. Gulliver, Cooperative key agreement for wireless networking: key rates and practical protocol design. IEEE Trans. Inf. Forensics Secur. 9(2), 272–284 (2014)

    Article  Google Scholar 

  25. T.X. Vu, P. Duhamel, M.D. Renzo, On the diversity of network-coded cooperation with decode-and-forward relay selection. IEEE Trans. Wirel. Commun. 14(8), 4369–4378 (2015)

    Article  Google Scholar 

  26. V.N.Q. Bao, N. Linh-Trung, M. Debbah, Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers. IEEE Trans. Wirel. Commun. 12(12), 6076–6085 (2013)

    Article  Google Scholar 

  27. C.D.T. Thai, P. Popovski, E. de Carvalho, F. Sun, Diversity-multiplexing trade-off for coordinated direct and relay schemes. IEEE Trans. Wirel. Commun. 12(7), 3289–3299 (2013)

    Article  Google Scholar 

  28. L. Shi, J. Yuan, S. Yu, M. Li, ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks, in Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2013

    Google Scholar 

  29. L. Lai, S.W. Ho, Key generation algorithms for pairwise independent networks based on graphical models. IEEE Trans. Inf. Theory 61(9), 4828–4837 (2015)

    Article  MathSciNet  Google Scholar 

  30. C. Javali, G. Revadigar, M. Ding, S. Jha, Secret key generation by virtual link estimation, in Proceedings of the EAI International Conference on Body Area Networks (BodyNets), Sept. 2015

    Google Scholar 

  31. W.C. Jakes, Microwave Mobile Communications (Wiley, Hoboken, 1972)

    Google Scholar 

  32. S. Zhang, S.C. Liew, P.P. Lam, Physical-layer network coding, in Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), no. 8, 2006

    Google Scholar 

  33. S.N. Premnath, S. Jana, J. Croft, P.L. Gowda, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, Secret key extraction from wireless signal strength in real environments. IEEE Trans. Mob. Comput. 12(5), 917–930 (2013)

    Article  Google Scholar 

  34. G. Brassard, L. Salvail, Secret-key reconciliation by public discussion, in EUROCRYPT, no. 14 (Springer, New York, 1994), pp. 410–423

    Google Scholar 

  35. C.H. Bennett, G. Brassard, C. Crepeau, U.M. Maurer, Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915–1923 (1995)

    Article  MathSciNet  Google Scholar 

  36. S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, On the effectiveness of secret key extraction from wireless signal strength in real environments, in Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), 2009

    Google Scholar 

  37. NIST, A statistical test suite for random and pseudorandom number generators for cryptographic applications, 2010

    Google Scholar 

  38. X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, W. Zhuang, Exploiting prediction to enable secure and reliable routing in wireless body area networks, in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2012

    Google Scholar 

Download references

Acknowledgment

This work is partially supported by Australian Research Council Discovery grant DP150100564.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zihuai Lin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Javali, C., Revadigar, G., Ding, M., Lin, Z., Jha, S. (2021). Cooperative Physical Layer Secret Key Generation by Virtual Link Estimation. In: Le, K.N. (eds) Physical Layer Security. Springer, Cham. https://doi.org/10.1007/978-3-030-55366-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-55366-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-55365-4

  • Online ISBN: 978-3-030-55366-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics