Shared Secret Key Generation via Carrier Frequency Offsets

被引:3
|
作者
Aman, Waqas [1 ]
Ijaz, Aneeqa [1 ]
Rahman, M. Mahboob Ur [1 ]
Jayakody, Dushanta Nalin K. [2 ,3 ]
Pervaiz, Haris [4 ]
机构
[1] Informat Technol Univ, Dept Elect Engn, Lahore, Pakistan
[2] Natl Res Tomsk Polytech Univ, Sch Comp Sci & Robot, Tomsk, Russia
[3] Sri Lanka Technol Campus, Sch Postgrad Studies & Res, Colombo, Sri Lanka
[4] Univ Lancaster, Sch Comp & Commun, Lancaster, England
关键词
SECURITY; MODEL;
D O I
10.1109/VTCSpring.2019.8746406
中图分类号
U [交通运输];
学科分类号
08 ; 0823 ;
摘要
This work presents a novel method to generate secret keys shared between a legitimate node pair (Alice and Bob) to safeguard the communication between them from an unauthorized node (Eve). To this end, we exploit the reciprocal carrier frequency offset (CFO) between the legitimate node pair to extract common randomness out of it to generate shared secret keys. The proposed key generation algorithm involves standard steps: the legitimate nodes exchange binary phase-shift keying (BPSK) signals to perform blind CFO estimation on the received signals, and do equi-probable quantization of the noisy CFO estimates followed by information reconciliation-to distil a shared secret key. Furthermore, guided by the Allan deviation curve, we distinguish between the two frequency-stability regimes-when the randomly time-varying CFO process i) has memory, ii) is memoryless; thereafter, we compute the key generation rate for both regimes. Simulation results show that the key disagreement rate decreases exponentially with increase in the signal to noise ratio of the link between Alice and Bob. Additionally, the decipher probability of Eve decreases as soon as either of the two links observed by the Eve becomes more degraded compared to the link between Alice and Bob.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels
    Lu, Youjing
    Wu, Fan
    Huang, Qianyi
    Tang, Shaojie
    Kong, Linghe
    Chen, Guihai
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (01)
  • [2] Secret Key Generation Via Localization and Mobility
    Gungor, Onur
    Chen, Fangzhou
    Koksal, Can Emre
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (06) : 2214 - 2230
  • [3] Study on Secret Key Generation Based on Frequency Domain Response of Channel in Single Carrier Frequency Domain Equalization Systems
    Kong Yuanyuan
    Yang Zhen
    Lu Bin
    Tian Feng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (05) : 1017 - 1023
  • [4] Secret Key Generation via a Modified Quantum Secret Sharing Protocol
    Smith, A. M.
    Evans, P. G.
    lawrie, B.
    Legre, M.
    Lougovski, P.
    Ray, W.
    Williams, B. P.
    Qi, B.
    Grice, W. P.
    QUANTUM INFORMATION AND COMPUTATION XIII, 2015, 9500
  • [5] Capacity of a Shared Secret Key
    Csiszar, Imre
    Narayan, Prakash
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2593 - 2596
  • [6] Secret Key Generation Rates over Frequency Selective Channels
    Mitev, Miroslav
    Barreto, Andre Noll
    Pham, Thuy M.
    Fettweis, Gerhard
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [7] Robust secret key generation for frequency-selective channels
    Sandell, Magnus
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [8] Veiled Shared key Generation for Intra-Convoy Secret Communication Sessions
    Al-Shareeda, Sarah
    2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [9] Secret Key Generation via Pulse-Coupled Synchronization
    Mahdavifar, Hessam
    Ebrahimi, Najme
    arXiv, 2019,
  • [10] Secret Key Generation via Random Beamforming in Stationary Environment
    Cheng, Longwang
    Li, Wei
    Ma, Dongtang
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,