Abstract
Physical layer key generation got much attention during the last time. However, the need of a common physical channel implies that only point-to-point keys can be generated. In this chapter, we investigate approaches how these point-to-point keys can be used for a secure establishment of end-to-end keys between two users who can only communicate over a multi-hop network. We start with a review of physical layer key generation taking different attacker models into account. Subsequently, we introduce general approaches for the end-to-end key establishment in the presence of various attackers who differ in their behavior and their area of control. We discuss four different path selection algorithms for the key establishment and evaluate their performance by means of simulations. The results show that the end-to-end key establishment can be protected by means of physical layer keys with a reasonable effort if suitable path selection is applied.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For the case with continuous channel alphabets, we have to further add a constraint on the second order moment of the channel input X, see [14].
References
Ahlswede R, Csiszár I (1993) Common randomness in information theory and cryptography—part I: secret sharing. IEEE Trans Inf Theory 39(4):1121–1132
Bloch M, Barros J (2011) Physical-layer security: from information theory to security engineering. Cambridge University Press, Cambridge
Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer, Berlin
Engelmann S, Wolf A, Jorswieck EA (2014) Precoding for secret key generation in multiple antenna channels with statistical channel state information. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP), Florence, Italy
Fettweis G, Nagel W, Lehner W (2012) Pathways to servers of the future. In: Design, automation and test in europe conference exhibition (DATE), pp 1161-1166
Jorswieck EA, Wolf A, Engelmann S (2013) Secret key generation from reciprocal spatially correlated MIMO channels. In: Proceedings of the 56th IEEE global communications conference (GLOBECOM), Atlanta, USA, invited
Liang Y, Kramer G, Poor HV, Shamai (Shitz) S (2009) Compound wiretap channels. EURASIP J Wirel Commun Netw
Liang Y, Poor HV, Shamai (Shitz) S (2009) Information theoretic security. Found Trends Commun Inf Theory 5(4-5):355–580
Ling H, Znati T (2007) End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. IJSN 2(1/2):109–121
Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742
Tomasin S, Jorswieck EA (2014) Pilot-based secret key agreement for reciprocal correlated MIMOME block fading channels. In: Proceedings of the 57th IEEE global communications conference (GLOBECOM), Austin, USA
Vía J (2014) Robust secret key capacity for the MIMO induced source model. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing (ICASSP), Florence, Italy
Wolf A, Jorswieck EA (2011) Maximization of worst-case secret key rates in MIMO systems with eavesdropper. In: Proceedings of the 54th IEEE global communications conference (GLOBECOM), Houston, USA
Wong TF, Bloch MR, Shea JM (2009) Secret sharing over fast-fading MIMO wiretap channels. EURASIP J Wirel Commun Netw
Acknowledgments
This work is supported in part by the German Research Foundation (DFG) in the Collaborative Research Center 912 “Highly Adaptive Energy-Efficient Computing” and by the Federal Ministry of Education and Research of the Federal Republic of Germany (Förderkennzeichen 16 KIS 0009, Prophylaxe). The authors alone are responsible for the content of the chapter.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Pfennig, S., Franz, E., Engelmann, S., Wolf, A. (2016). End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models. In: Baldi, M., Tomasin, S. (eds) Physical and Data-Link Security Techniques for Future Communication Systems. Lecture Notes in Electrical Engineering, vol 358. Springer, Cham. https://doi.org/10.1007/978-3-319-23609-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-23609-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23608-7
Online ISBN: 978-3-319-23609-4
eBook Packages: EngineeringEngineering (R0)