Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis

Published: 01 September 2010 Publication History

Abstract

Information theoretic limits for random key generation in multiple-input multiple-output (MIMO) wireless systems exhibiting a reciprocal channel response are investigated experimentally with a new three-node MIMO measurement campaign. As background, simple expressions are presented for the number of available key bits, as well as the number of bits that are secure from a close eavesdropper. Two methods for generating secret keys are analyzed in the context of MIMO channels and their mismatch rate and efficiency are derived. A new wideband indoor MIMO measurement campaign in the 2.51- to 2.59-GHz band is presented, whose purpose is to study the number of available key bits in both line-of-sight and nonline-of-sight environments. Application of the key generation methods to measured propagation channels indicates key generation rates that can be obtained in practice for four-element arrays.

References

[1]
J. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
[2]
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
[3]
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
[4]
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography--Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
[5]
J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
[6]
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels--Part I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
[7]
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels--Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
[8]
U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels--Part III: Privacy amplification," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
[9]
G. Van Assche, J. Cardinal, and N. J. Cerf, "Reconciliation of a quantum-distributed Gaussian key," IEEE Trans. Inf. Theory, vol. 50, no. 2, pp. 394-400, Feb. 2004.
[10]
C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. 2006 IEEE Intl. Symp. on Information Theory, Seattle, WA, Jul. 9-14, 2006, pp. 2593-2597.
[11]
C. Ye, A. Reznik, G. Sternberg, and Y. Shah, "On the secrecy capabilities of ITU channels," in Proc. 2007 IEEE 66th Veh. Technol. Conf., Baltimore, MD, Sep. 30-0ct. 3 2007.
[12]
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Commun. Lett., vol. 4, no. 2, pp. 52-55, Feb. 2000.
[13]
T. Aono, K. Higuchi, T. Ohira, B. Kamiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
[14]
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 364-375, Sep. 2007.
[15]
A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. 2008 IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Las Vegas, NV, Mar. 31-Apr. 4 2008, pp. 3013-3016.
[16]
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. 14th ACM Int. Canf. Mobile Computing and Networking (MobiCom'08), San Francisco, CA, Sep. 14-19, 2008, pp. 128-139.
[17]
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Manday am, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 240-254, Jun. 2010.
[18]
I. C. Corporation, "Method and System for Deriving an Encryption Key Using Joint Randomness Not Shared by Others," U.S. Patent Application ITC-2-1135.01.WO, 2006.
[19]
A. O. Hero, III, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
[20]
X. Li and E. P. Ratazzi, "MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks," in Proc. 2005 IEEE Military Comm. Conf. (MILCOM'05), Atlantic City, NJ, Oct. 17-20, 2005, vol. 3, pp. 1353-1359.
[21]
X. Zhou, P. Kyritsi, P. Eggers, and F. Fitzek, "The medium is the message: Secure communication via waveform coding in MIMO systems," in Proc. 2007 IEEE 65th Veh. Technol. Conf., Dublin, Ireland, Apr. 22-25, 2007, pp. 491-495.
[22]
H. Kim and J. D. Villasenor, "Secure MIMO communications in a system with equal numbers of transmit and receive antennas," IEEE Commun. Lett., vol. 12, no. 5, pp. 386-388, May 2008.
[23]
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
[24]
M. S. Mohanunadi, "MIMO minimum leakage-physically secure wireless data transmission," in Proc. 2009 Int. Conf. Application Information and Communication Technologies, Baku, Azerbaijan, Oct. 14-16, 2009, pp. 1-5.
[25]
J. Wallace, C. Chen, and M. Jensen, "Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits," in Proc. 3rd Eur. Conf. Antennas and Propagation (EuCAP '09), Berlin, Germany, Mar. 23-27, 2009, pp. 1499-1503.
[26]
J. Wallace, "Secure physical layer key generation schemes: Performance and infomlation theoretic limits;' in Proc. IEEE Int. Conf. Communications (ICC '09), Dresden, Germany, Jun. 14-18, 2009, pp. 1-5.
[27]
T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. 2009 IEEE Int. Symp. Inf. Theory, Seoul, South Korea, Jun. 28-Jul. 3 2009, pp. 2296-2300.
[28]
M. A. Jensen and J. W. Wallace, "A review of antennas and propagation for MIMO wirekss communications," IEEE Trans. Antennas Propag., vol. 52, no. 11, pp. 2810-2824, Nov. 2004.
[29]
S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, Mar. 2003.
[30]
B. T. Maharaj, J. W. Wallace, M. A. Jensen, and L. P. Linde, "A low-cost open-hardware wideband multiple-input multiple-output (MIMO) wireless channel sounder," IEEE Trans. Instrum. Meas., vol. 57, no. 10, pp. 2283-2289, Oct. 2008.

Cited By

View all
  • (2024)Distributed Secret Sharing Over a Public Channel From Correlated Random VariablesIEEE Transactions on Information Theory10.1109/TIT.2024.336364470:4(2851-2869)Online publication date: 1-Apr-2024
  • (2024)Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave Multi-User SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339703719(5373-5388)Online publication date: 6-May-2024
  • (2024)Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.333158819(1086-1098)Online publication date: 1-Jan-2024
  • Show More Cited By
  1. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image IEEE Transactions on Information Forensics and Security
      IEEE Transactions on Information Forensics and Security  Volume 5, Issue 3
      September 2010
      242 pages

      Publisher

      IEEE Press

      Publication History

      Published: 01 September 2010
      Revised: 25 May 2010
      Received: 17 December 2009

      Author Tags

      1. Cryptography
      2. MIMO
      3. cryptography
      4. encryption
      5. measurement
      6. time varying channels

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 22 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Distributed Secret Sharing Over a Public Channel From Correlated Random VariablesIEEE Transactions on Information Theory10.1109/TIT.2024.336364470:4(2851-2869)Online publication date: 1-Apr-2024
      • (2024)Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave Multi-User SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.339703719(5373-5388)Online publication date: 6-May-2024
      • (2024)Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based ApproachIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.333158819(1086-1098)Online publication date: 1-Jan-2024
      • (2023)Physical Layer Key Generation in Practical 802.11 MIMO-OFDM NetworksIEEE Transactions on Wireless Communications10.1109/TWC.2023.330412023:4(2933-2945)Online publication date: 16-Aug-2023
      • (2023)Generalized Channel Probing and Generalized Pre-Processing for Secret Key GenerationIEEE Transactions on Signal Processing10.1109/TSP.2023.325914271(1067-1082)Online publication date: 1-Jan-2023
      • (2023)Joint Precoding and Phase Shift Design in Reconfigurable Intelligent Surfaces-Assisted Secret Key GenerationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326888118(3251-3266)Online publication date: 1-Jan-2023
      • (2023)Continuous Encryption Functions for Security Over NetworksSignal Processing10.1016/j.sigpro.2022.108807203:COnline publication date: 1-Feb-2023
      • (2023)RIS-assisted physical layer key generation by exploiting randomness from channel coefficients of reflecting elements and OFDM subcarriersAd Hoc Networks10.1016/j.adhoc.2022.103002138:COnline publication date: 1-Jan-2023
      • (2022)A channel perceiving attack and the countermeasure on long-range IoT physical layer key generationComputer Communications10.1016/j.comcom.2022.04.027191:C(108-118)Online publication date: 1-Jul-2022
      • (2021)A Novel Model-Based Security Scheme for LoRa Key GenerationProceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021)10.1145/3412382.3458256(47-61)Online publication date: 18-May-2021
      • Show More Cited By

      View Options

      View options

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media