486 research outputs found
The Effect of Eavesdropper's Statistics in Experimental Wireless Secret-Key Generation
This paper investigates the role of the eavesdropper's statistics in the
implementation of a practical secret-key generation system. We carefully
conduct the information-theoretic analysis of a secret-key generation system
from wireless channel gains measured with software-defined radios. In
particular, we show that it is inaccurate to assume that the eavesdropper gets
no information because of decorrelation with distance. We also provide a bound
for the achievable secret-key rate in the finite key-length regime that takes
into account the presence of correlated eavesdropper's observations. We
evaluate this bound with our experimental gain measurements to show that
operating with a finite number of samples incurs a loss in secret-key rate on
the order of 20%.Comment: Submitted to the IEEE Transactions on Information Forensics and
Securit
Secret Key Generation Based on AoA Estimation for Low SNR Conditions
In the context of physical layer security, a physical layer characteristic is
used as a common source of randomness to generate the secret key. Therefore an
accurate estimation of this characteristic is the core for reliable secret key
generation. Estimation of almost all the existing physical layer characteristic
suffer dramatically at low signal to noise (SNR) levels. In this paper, we
propose a novel secret key generation algorithm that is based on the estimated
angle of arrival (AoA) between the two legitimate nodes. Our algorithm has an
outstanding performance at very low SNR levels. Our algorithm can exploit
either the Azimuth AoA to generate the secret key or both the Azimuth and
Elevation angles to generate the secret key. Exploiting a second common source
of randomness adds an extra degree of freedom to the performance of our
algorithm. We compare the performance of our algorithm to the algorithm that
uses the most commonly used characteristics of the physical layer which are
channel amplitude and phase. We show that our algorithm has a very low bit
mismatch rate (BMR) at very low SNR when both channel amplitude and phase based
algorithm fail to achieve an acceptable BMR
Impact of Realistic Propagation Conditions on Reciprocity-Based Secret-Key Capacity
Secret-key generation exploiting the channel reciprocity between two
legitimate parties is an interesting alternative solution to cryptographic
primitives for key distribution in wireless systems as it does not rely on an
access infrastructure and provides information-theoretic security. The large
majority of works in the literature generally assumes that the eavesdropper
gets no side information about the key from her observations provided that (i)
it is spaced more than a wavelength away from a legitimate party and (ii) the
channel is rich enough in scattering. In this paper, we show that this
condition is not always verified in practice and we analyze the secret-key
capacity under realistic propagation conditions
Secure key design approaches using entropy harvesting in wireless sensor network: A survey
Physical layer based security design in wireless sensor networks have gained much importance since the past decade. The various constraints associated with such networks coupled with other factors such as their deployment mainly in remote areas, nature of communication etc. are responsible for development of research works where the focus is secured key generation, extraction, and sharing. Keeping the importance of such works in mind, this survey is undertaken that provides a vivid description of the different mechanisms adopted for securely generating the key as well its randomness extraction and also sharing. This survey work not only concentrates on the more common methods, like received signal strength based but also goes on to describe other uncommon strategies such as accelerometer based. We first discuss the three fundamental steps viz. randomness extraction, key generation and sharing and their importance in physical layer based security design. We then review existing secure key generation, extraction, and sharing mechanisms and also discuss their pros and cons. In addition, we present a comprehensive comparative study of the recent advancements in secure key generation, sharing, and randomness extraction approaches on the basis of adversary, secret bit generation rate, energy efficiency etc. Finally, the survey wraps up with some promising future research directions in this area
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
AbstractWithin the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from eavesdroppers. In this paper, we survey the most recent common sources of randomness used to generate the secret key. We present the steps used to extract the secret key from the estimated common source of randomness. We describe the metrics used to evaluate the strength of the generated key. We follow that with a qualitative comparison between different common sources of randomness along with a proposed new direction which capitalizes on hybridization of sources of randomness. We conclude by a discussion about current open research problems in secret key generation
- …