End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models
Abstract
Physical layer key generation got much attention during the last time. However, the need of a common physical channel implies that only point-to-point keys can be generated. In this chapter, we investigate approaches how these point-to-point keys can be used for a secure establishment of end-to-end keys between two users who can only communicate over a multi-hop network. We start with a review of physical layer key generation taking different attacker models into account. Subsequently, we introduce general approaches for the end-to-end key establishment in the presence of various attackers who differ in their behavior and their area of control. We discuss four different path selection algorithms for the key establishment and evaluate their performance by means of simulations. The results show that the end-to-end key establishment can be protected by means of physical layer keys with a reasonable effort if suitable path selection is applied.
Keywords
Channel Estimation Network Node Physical Layer Attack Model External EntityNotes
Acknowledgments
This work is supported in part by the German Research Foundation (DFG) in the Collaborative Research Center 912 “Highly Adaptive Energy-Efficient Computing” and by the Federal Ministry of Education and Research of the Federal Republic of Germany (Förderkennzeichen 16 KIS 0009, Prophylaxe). The authors alone are responsible for the content of the chapter.
References
- 1.Ahlswede R, Csiszár I (1993) Common randomness in information theory and cryptography—part I: secret sharing. IEEE Trans Inf Theory 39(4):1121–1132MATHCrossRefGoogle Scholar
- 2.Bloch M, Barros J (2011) Physical-layer security: from information theory to security engineering. Cambridge University Press, CambridgeCrossRefGoogle Scholar
- 3.Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer, BerlinCrossRefGoogle Scholar
- 4.Engelmann S, Wolf A, Jorswieck EA (2014) Precoding for secret key generation in multiple antenna channels with statistical channel state information. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP), Florence, ItalyGoogle Scholar
- 5.Fettweis G, Nagel W, Lehner W (2012) Pathways to servers of the future. In: Design, automation and test in europe conference exhibition (DATE), pp 1161-1166Google Scholar
- 6.Jorswieck EA, Wolf A, Engelmann S (2013) Secret key generation from reciprocal spatially correlated MIMO channels. In: Proceedings of the 56th IEEE global communications conference (GLOBECOM), Atlanta, USA, invitedGoogle Scholar
- 7.Liang Y, Kramer G, Poor HV, Shamai (Shitz) S (2009) Compound wiretap channels. EURASIP J Wirel Commun NetwGoogle Scholar
- 8.Liang Y, Poor HV, Shamai (Shitz) S (2009) Information theoretic security. Found Trends Commun Inf Theory 5(4-5):355–580Google Scholar
- 9.Ling H, Znati T (2007) End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. IJSN 2(1/2):109–121CrossRefGoogle Scholar
- 10.Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742MATHCrossRefGoogle Scholar
- 11.Tomasin S, Jorswieck EA (2014) Pilot-based secret key agreement for reciprocal correlated MIMOME block fading channels. In: Proceedings of the 57th IEEE global communications conference (GLOBECOM), Austin, USAGoogle Scholar
- 12.Vía J (2014) Robust secret key capacity for the MIMO induced source model. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing (ICASSP), Florence, ItalyGoogle Scholar
- 13.Wolf A, Jorswieck EA (2011) Maximization of worst-case secret key rates in MIMO systems with eavesdropper. In: Proceedings of the 54th IEEE global communications conference (GLOBECOM), Houston, USAGoogle Scholar
- 14.Wong TF, Bloch MR, Shea JM (2009) Secret sharing over fast-fading MIMO wiretap channels. EURASIP J Wirel Commun NetwGoogle Scholar