Advertisement

Wireless Networks

, Volume 25, Issue 2, pp 611–624 | Cite as

Efficient key generation leveraging channel reciprocity and balanced gray code

  • Furui Zhan
  • Nianmin YaoEmail author
  • Zhenguo Gao
  • Zhimao Lu
  • Bingcai Chen
Article
  • 147 Downloads

Abstract

Key generation leveraging wireless channel reciprocity can establish secret keys from unauthenticated broadcast channels and thus protect the communication of wireless networks. However, in real environments, the measurements collected by the involved transceivers might have many discrepancies due to the non-simultaneous directional measurements and other factors, such as hardware differences and asymmetric interferences. Meanwhile, if the multi-level quantization in conjunction with source coding is implemented to convert measurements to bits, the resulting high bit mismatch rate makes key agreement inefficient and insecure. In this paper, key generation schemes leveraging channel reciprocity and balanced gray code are proposed. To enhance the efficiency of key generation, an efficient encoding scheme based on balanced gray code is carried out during key generation. The proposed encoding scheme can simultaneously reduce the bit mismatch rate and improve the secret bit rate. In addition, the code book is reusable once it is generated. The proposed key generation schemes can be classified into the uniform and non-uniform schemes according to different quantization processes. Several experiments in real mobile environments are conducted to validate the proposed schemes. The received signal strength measurements are extracted from heterogeneous devices as statistics of channel states in each experiment. The results of these experiments show that (1) the proposed encoding scheme significantly enhances the efficiency of key generation; (2) both the uniform and non-uniform schemes can efficiently generate secret keys between heterogeneous transceivers.

Keywords

Key generation Channel reciprocity Balanced gray code Wireless networks 

References

  1. 1.
    Bennett, C. H., Brassard, G., Crépeau, C., & Maurer, U. M. (1995). Generalized privacy amplification. IEEE Transactions on Information Theory, 41(6), 1915–1923.MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Bennett, C. H., Brassard, G., & Robert, J. M. (1988). Privacy amplification by public discussion. SIAM Journal on Computing, 17(2), 210–229.MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Brassard, G., & Salvail, L. (1994). Secret-key reconciliation by public discussion. In Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, EUROCRYPT ’93, Lofthus, Norway (pp. 410–423). Secaucus, NJ: Springer-Verlag New York, Inc.Google Scholar
  4. 4.
    Flahive, M. (2008). Balancing cyclic r-ary gray codes ii. The Electronic Journal of Combinatorics, 15(1), R128.MathSciNetzbMATHGoogle Scholar
  5. 5.
    Jana, S., Premnath, S. N., Clark, M., Kasera, S. K., Patwari, N., & Krishnamurthy, S. V. (2009). On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on mobile computing and networking (pp. 321–332). ACM.Google Scholar
  6. 6.
    Khisti, A., Diggavi, S. N., & Wornell, G. W. (2011). Secret-key agreement with channel state information at the transmitter. IEEE Transactions on Information Forensics and Security, 6(3 PART 1), 672–681.CrossRefGoogle Scholar
  7. 7.
    Liu, H., Yang, J., Wang, Y., & Chen, Y. (2012). Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In Proceedings-IEEE INFOCOM, Orlando, FL, United states (pp. 927 – 935).Google Scholar
  8. 8.
    Mathur, S., Trappe, W., Mandayam, N., Ye, C., & Reznik, A. (2008). Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking (pp. 128–139). ACM.Google Scholar
  9. 9.
    Patwari, N., Croft, J., Jana, S., & Kasera, S. K. (2010). High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing, 9(1), 17–30.CrossRefGoogle Scholar
  10. 10.
    Premnath, S. N., Jana, S., Croft, J., Gowda, P. L., Clark, M., Kasera, S. K., et al. (2013). Secret key extraction from wireless signal strength in real environments. IEEE Transactions on Mobile Computing, 12(5), 917–930.CrossRefGoogle Scholar
  11. 11.
    Rappaport, T. S., et al. (1996). Wireless communications: Principles and practice (2nd ed.). New Jersey: Prentice Hall.zbMATHGoogle Scholar
  12. 12.
    Rukhin, A., Soto, J., Nechvatal, J., Smid, M., & Barker, E. (2001). A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., DTIC Document.Google Scholar
  13. 13.
    Sayeed, A., & Perrig, A. (2008). Secure wireless communications: Secret keys through multipath. In ICASSP, proceedings of the IEEE international conference on acoustics, speech and signal processing, Las Vegas, NV, United states (pp. 3013–3016).Google Scholar
  14. 14.
    Shehadeh, Y. E. H., & Hogrefe, D. (2015). A survey on secret key generation mechanisms on the physical layer in wireless networks. Security and Communication Networks, 8(2), 332–341.CrossRefGoogle Scholar
  15. 15.
    Wallace, J. (2009). Secure physical layer key generation schemes: Performance and information theoretic limits. In IEEE International conference on communications, Dresden, Germany.Google Scholar
  16. 16.
    Wallace, J. W., & Sharma, R. K. (2010). Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis. IEEE Transactions on Information Forensics and Security, 5(3), 381–392.CrossRefGoogle Scholar
  17. 17.
    Wang, T., Liu, Y., & Vasilakos, A. V. (2015). Survey on channel reciprocity based key establishment techniques for wireless systems. Wireless Networks, 21(6), 1835–1846.CrossRefGoogle Scholar
  18. 18.
    Wei, Y., Zeng, K., & Mohapatra, P. (2011). Adaptive wireless channel probing for shared key generation. In IEEE 2011 proceedings on INFOCOM (pp. 2165–2173). IEEE.Google Scholar
  19. 19.
    Wilhelm, M., Martinovic, I., & Schmitt, J. B. (2013). Secure key generation in sensor networks based on frequency-selective channels. IEEE Journal on Selected Areas in Communications, 31(9), 1779–1790.CrossRefGoogle Scholar
  20. 20.
    Wilson, R., Tse, D., & Scholtz, R. A. (2007). Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Transactions on Information Forensics and Security, 2(3), 364–375.CrossRefGoogle Scholar
  21. 21.
    Ye, C., Mathur, S., Reznik, A., Shah, Y., Trappe, W., & Mandayam, N. B. (2010). Information-theoretically secret key generation for fading wireless channels. IEEE Transactions on Information Forensics and Security, 5(2), 240–254.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department Computer Science and TechnologyDalian University of TechnologyDalianChina

Personalised recommendations