Skip to main content

End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models

  • Conference paper
  • First Online:
Physical and Data-Link Security Techniques for Future Communication Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 358))

Abstract

Physical layer key generation got much attention during the last time. However, the need of a common physical channel implies that only point-to-point keys can be generated. In this chapter, we investigate approaches how these point-to-point keys can be used for a secure establishment of end-to-end keys between two users who can only communicate over a multi-hop network. We start with a review of physical layer key generation taking different attacker models into account. Subsequently, we introduce general approaches for the end-to-end key establishment in the presence of various attackers who differ in their behavior and their area of control. We discuss four different path selection algorithms for the key establishment and evaluate their performance by means of simulations. The results show that the end-to-end key establishment can be protected by means of physical layer keys with a reasonable effort if suitable path selection is applied.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For the case with continuous channel alphabets, we have to further add a constraint on the second order moment of the channel input X, see [14].

References

  1. Ahlswede R, Csiszár I (1993) Common randomness in information theory and cryptography—part I: secret sharing. IEEE Trans Inf Theory 39(4):1121–1132

    Article  MATH  Google Scholar 

  2. Bloch M, Barros J (2011) Physical-layer security: from information theory to security engineering. Cambridge University Press, Cambridge

    Book  Google Scholar 

  3. Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer, Berlin

    Book  Google Scholar 

  4. Engelmann S, Wolf A, Jorswieck EA (2014) Precoding for secret key generation in multiple antenna channels with statistical channel state information. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP), Florence, Italy

    Google Scholar 

  5. Fettweis G, Nagel W, Lehner W (2012) Pathways to servers of the future. In: Design, automation and test in europe conference exhibition (DATE), pp 1161-1166

    Google Scholar 

  6. Jorswieck EA, Wolf A, Engelmann S (2013) Secret key generation from reciprocal spatially correlated MIMO channels. In: Proceedings of the 56th IEEE global communications conference (GLOBECOM), Atlanta, USA, invited

    Google Scholar 

  7. Liang Y, Kramer G, Poor HV, Shamai (Shitz) S (2009) Compound wiretap channels. EURASIP J Wirel Commun Netw

    Google Scholar 

  8. Liang Y, Poor HV, Shamai (Shitz) S (2009) Information theoretic security. Found Trends Commun Inf Theory 5(4-5):355–580

    Google Scholar 

  9. Ling H, Znati T (2007) End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. IJSN 2(1/2):109–121

    Article  Google Scholar 

  10. Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742

    Article  MATH  Google Scholar 

  11. Tomasin S, Jorswieck EA (2014) Pilot-based secret key agreement for reciprocal correlated MIMOME block fading channels. In: Proceedings of the 57th IEEE global communications conference (GLOBECOM), Austin, USA

    Google Scholar 

  12. Vía J (2014) Robust secret key capacity for the MIMO induced source model. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing (ICASSP), Florence, Italy

    Google Scholar 

  13. Wolf A, Jorswieck EA (2011) Maximization of worst-case secret key rates in MIMO systems with eavesdropper. In: Proceedings of the 54th IEEE global communications conference (GLOBECOM), Houston, USA

    Google Scholar 

  14. Wong TF, Bloch MR, Shea JM (2009) Secret sharing over fast-fading MIMO wiretap channels. EURASIP J Wirel Commun Netw

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by the German Research Foundation (DFG) in the Collaborative Research Center 912 “Highly Adaptive Energy-Efficient Computing” and by the Federal Ministry of Education and Research of the Federal Republic of Germany (Förderkennzeichen 16 KIS 0009, Prophylaxe). The authors alone are responsible for the content of the chapter.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Pfennig .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Pfennig, S., Franz, E., Engelmann, S., Wolf, A. (2016). End-to-End Key Establishment with Physical Layer Key Generation and Specific Attacker Models. In: Baldi, M., Tomasin, S. (eds) Physical and Data-Link Security Techniques for Future Communication Systems. Lecture Notes in Electrical Engineering, vol 358. Springer, Cham. https://doi.org/10.1007/978-3-319-23609-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23609-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23608-7

  • Online ISBN: 978-3-319-23609-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics