Fast and scalable secret key generation exploiting channel phase randomness in wireless networks

被引:0
|
作者
Wang, Qian [1 ]
Su, Hai [1 ]
Ren, Kui [1 ]
Kim, Kwangjo [2 ]
机构
[1] IIT, Dept ECE, Chicago, IL 60616 USA
[2] Korea Adv Inst Sci & Technol, Dept CS, Daejeon, 305732, South Korea
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Several interesting approaches have been developed and demonstrated for their feasibility. The state-of-the-art, however, still has much room for improving their practicality. This is because i) the key bit generation rate supported by most existing approaches is very low which significantly limits their practical usage given the intermittent connectivity in mobile environments; ii) existing approaches suffer from the scalability and flexibility issues, i. e., they cannot be directly extended to support efficient group key generation and do not suit for static environments. With these observations in mind, we present a new secret key generation approach that utilizes the uniformly distributed phase information of channel responses to extract shared cryptographic keys under narrowband multipath fading models. The proposed approach enjoys a high key bit generation rate due to its efficient introduction of multiple randomized phase information within a single coherence time interval as the keying sources. The proposed approach also provides scalability and flexibility because it relies only on the transmission of periodical extensions of unmodulated sinusoidal beacons, which allows effective accumulation of channel phases across multiple nodes. The proposed scheme is thoroughly evaluated through both analytical and simulation studies. Compared to existing work that focus on pairwise key generation, our approach is highly scalable and can improve the analytical key bit generation rate by a couple of orders of magnitude.
引用
收藏
页码:1422 / 1430
页数:9
相关论文
共 50 条
  • [21] Secret Key Generation by Exploiting Traffic Load for Mobile Adhoc Networks
    K. R. Shibu
    R. Sujipramila
    Wireless Personal Communications, 2021, 119 : 1899 - 1912
  • [22] Secret Key Generation by Exploiting Traffic Load for Mobile Adhoc Networks
    Shibu, K. R.
    Sujipramila, R.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (02) : 1899 - 1912
  • [23] Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers
    Zhang, Junqing
    Marshall, Alan
    Woods, Roger
    Duong, Trung Q.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (06) : 2578 - 2588
  • [24] Shared Secret Key Generation Protocol in Wireless Networks Based on the Phase of MIMO Fading Channels
    Vajihe Zeinali
    Hossein Khaleghi Bizaki
    Wireless Personal Communications, 2016, 89 : 1315 - 1334
  • [25] Shared Secret Key Generation Protocol in Wireless Networks Based on the Phase of MIMO Fading Channels
    Zeinali, Vajihe
    Bizaki, Hossein Khaleghi
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (04) : 1315 - 1334
  • [26] A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
    Wang, Qiuhua
    Kang, Mingyang
    Wu, Guohua
    Ren, Yizhi
    Su, Chunhua
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (02) : 230 - 238
  • [27] Efficient Kalman Modeling of Multipath Wireless Channel for Secret Key Generation
    Aljerme, Abdelkader
    Liu, Huaping
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 586 - 590
  • [28] Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels
    Huang, Jing Jing
    Jiang, Ting
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (10): : 3557 - 3571
  • [29] On the security of fast secret key generation protocol with virtual channel approach
    Chen, Da-Jiang
    Qin, Zhen
    Qin, Zhi-Guang
    Wang, Rui-Jing
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2015, 44 (01): : 112 - 116
  • [30] Extracting Secret Key from Channel Measurements in Wireless Sensor Networks
    Perkovic, T.
    Begusic, D.
    2009 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2009, : 235 - 238