Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels
Abstract
The multipath-rich wireless environment associated
with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter–receiver pair. The complexity associated with a richly scattering environment implies that the shortterm
fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on the “Reciprocity
based key exchange model” allows two parties jointly establish physically secure key combined with a (standard) computationally secure key, over an insecure communication channel. This key can then be used to encrypt subsequent communications.
The channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical Wi-Fi channel that reliable secret key establishment can be accomplished at rates on the order of 11 b/s.
Keywords
Full Text:
PDFReferences
. J.p. Miller and K.R. Paul “Analysis and optimization of sensor coverage
problems in wireless sensor network” in 2011 IEEE Wireless
communications and Networking conference, 2011.
. J.-P. Cheng, Y.-H. Li, P.-C. Yeh and C.-M. Cheng, “MIMO-OFDM
PHY Integrated (MOPI) scheme for confidential wireless transmission,”
in 2010 IEEE Wireless Communications and Networking Conference
(WCNC), 2010, pp. 1–6.
. A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no.
, pp. 1355–1387, 1975.
. X. Li, J. Hwu, and E. P. Ratazzi, “Array redundancy and diversity for
wireless transmissions with low probability of interception,” in Proc
.IEEE Conf. Acoustics, Speech and Signal Processing, vol. 4, 2006, pp.
–528.
. M. L. Jørgensen, B. R. Yanakiev, G. E. Kirkelund, P. Popovski, H.
Yomo, and T. Larsen, “Shout to secure: Physical-layer wireless security
with known interference,” in IEEE Global Telecommunications Conf.,
, pp. 33–38.
. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE
Trans. Wireless Commun., vol. 7, pp. 2180–2189, Jun. 2008.
. M. Kobayashi and M. Debbah, “On the secrecy capacity of frequency
selective fading channels: A practical Vandermonde precoding,” in
IEEE 19th Int. Symp. Personal, Indoor and Mobile Radio
Communications, 2008.
. S. Lakshmanan, C.-L. Tsao, R. Sivakumar, and K. Sundaresan,
“Securing wireless data networks against eavesdropping using smart
antennas,” in 28th Int. Conf. Distributed Computing Systems, 2008, pp.
–27.
. A. Canteaut, “Filter generator,” Encyclopedia of Cryptography and
Security, H.C.A. van Tilborg, Ed., Springer, 2005.
. N. Mentens, J. Genoe, B. Preneel, and I. Verbauwhede, “A low-cost
implementation of
Trivium,”https://www.cosic.esat.kuleuven.be/publications/article-
pdf.
. C. D. Canniere, O. Dunkelman, and M. Knezevic, “Katan and ktantan- a
family of small and efficient hardware-oriented block ciphers,” Lecture
Notes in Computer Science, Cryptographic Hardware and Embedded
Systems, vol. 5747, 2009.
. 3GPP TR 25.996 V9.0.0, 3GPP RAN1 SP-46, 3rd Generation
Partnership Project Std., 2009.
. 3GPP TR 36.814 V9.0.0, 3GPP RAN1 RP-47, 3rd Generation
Partnership Project Std., 2011.
. P.-A. Fouque, D. Pointcheval, and S. Zimmer, “HMAC is a randomness
extractor and applications to TLS,” in Proceedings of the 2008 ACM
symposium on Information, computer and communications security
(ASIACCS’08), Tokyo, Japan, Mar. 2008.
. C. Ye, A. Reznik, and Y. Shah, “Extracting secrecy from jointly
Gaussian random variables,” in Proc. Int. Symp. Inform. Theory, Jul.
, pp. 2593–2597.
. 3GPP TR 25.996 V9.0.0, 3GPP RAN1 SP-46, 3rd Generation
Partnership Project Std., 2010.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.