3 research outputs found
How to Test the Randomness from the Wireless Channel for Security?
We revisit the traditional framework of wireless secret key generation, where
two parties leverage the wireless channel randomness to establish a secret key.
The essence in the framework is to quantify channel randomness into bit
sequences for key generation. Conducting randomness tests on such bit sequences
has been a common practice to provide the confidence to validate whether they
are random. Interestingly, despite different settings in the tests, existing
studies interpret the results the same: passing tests means that the bit
sequences are indeed random.
In this paper, we investigate how to properly test the wireless channel
randomness to ensure enough security strength and key generation efficiency. In
particular, we define an adversary model that leverages the imperfect
randomness of the wireless channel to search the generated key, and create a
guideline to set up randomness testing and privacy amplification to eliminate
security loss and achieve efficient key generation rate. We use theoretical
analysis and comprehensive experiments to reveal that common practice misuses
randomness testing and privacy amplification: (i) no security insurance of key
strength, (ii) low efficiency of key generation rate. After revision by our
guideline, security loss can be eliminated and key generation rate can be
increased significantly
Securing NextG networks with physical-layer key generation: A survey
As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks
Extracting secret key from wireless link dynamics in vehicular environments
Abstract—A crucial component of vehicular network security is to establish a secure wireless channel between any two vehicles. In this paper, we propose a scheme to allow two cars to extract a secret key from RSSI (Received Signal Strength Indicator) values in such a way that nearby cars cannot obtain the same secret. Our solution can be executed in noisy, outdoor vehicular environments. We also propose an online parameter learning mechanism to adapt to different channel conditions. We conduct extensive realworld experiments to validate our solution. I