Open Access Open Access  Restricted Access Subscription or Fee Access

Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels

J. Nagaraj, Dr.G.M. Kadhar Nawaz

Abstract


The multipath-rich wireless environment associated
with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter–receiver pair. The complexity associated with a richly scattering environment implies that the shortterm
fading process is inherently hard to predict and best modeled stochastically, with rapid decorrelation properties in space, time, and frequency. In this paper, we demonstrate how the channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We begin by presenting a scheme based on the “Reciprocity
based key exchange model” allows two parties jointly establish  physically secure key combined with a (standard) computationally secure key, over an insecure communication channel. This key can then be used to encrypt subsequent communications.
The channel state between a wireless transmitter and receiver can be used as the basis for building practical secret key generation protocols between two entities. We validate both proposed protocols through experimentations using a customized 802.11a platform, and show for the typical Wi-Fi channel that reliable secret key establishment can be accomplished at rates on the order of 11 b/s.


Keywords


Wireless, Wi-Fi, Cryptography, MOPI

Full Text:

PDF

References


. J.p. Miller and K.R. Paul “Analysis and optimization of sensor coverage

problems in wireless sensor network” in 2011 IEEE Wireless

communications and Networking conference, 2011.

. J.-P. Cheng, Y.-H. Li, P.-C. Yeh and C.-M. Cheng, “MIMO-OFDM

PHY Integrated (MOPI) scheme for confidential wireless transmission,”

in 2010 IEEE Wireless Communications and Networking Conference

(WCNC), 2010, pp. 1–6.

. A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no.

, pp. 1355–1387, 1975.

. X. Li, J. Hwu, and E. P. Ratazzi, “Array redundancy and diversity for

wireless transmissions with low probability of interception,” in Proc

.IEEE Conf. Acoustics, Speech and Signal Processing, vol. 4, 2006, pp.

–528.

. M. L. Jørgensen, B. R. Yanakiev, G. E. Kirkelund, P. Popovski, H.

Yomo, and T. Larsen, “Shout to secure: Physical-layer wireless security

with known interference,” in IEEE Global Telecommunications Conf.,

, pp. 33–38.

. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE

Trans. Wireless Commun., vol. 7, pp. 2180–2189, Jun. 2008.

. M. Kobayashi and M. Debbah, “On the secrecy capacity of frequency

selective fading channels: A practical Vandermonde precoding,” in

IEEE 19th Int. Symp. Personal, Indoor and Mobile Radio

Communications, 2008.

. S. Lakshmanan, C.-L. Tsao, R. Sivakumar, and K. Sundaresan,

“Securing wireless data networks against eavesdropping using smart

antennas,” in 28th Int. Conf. Distributed Computing Systems, 2008, pp.

–27.

. A. Canteaut, “Filter generator,” Encyclopedia of Cryptography and

Security, H.C.A. van Tilborg, Ed., Springer, 2005.

. N. Mentens, J. Genoe, B. Preneel, and I. Verbauwhede, “A low-cost

implementation of

Trivium,”https://www.cosic.esat.kuleuven.be/publications/article-

pdf.

. C. D. Canniere, O. Dunkelman, and M. Knezevic, “Katan and ktantan- a

family of small and efficient hardware-oriented block ciphers,” Lecture

Notes in Computer Science, Cryptographic Hardware and Embedded

Systems, vol. 5747, 2009.

. 3GPP TR 25.996 V9.0.0, 3GPP RAN1 SP-46, 3rd Generation

Partnership Project Std., 2009.

. 3GPP TR 36.814 V9.0.0, 3GPP RAN1 RP-47, 3rd Generation

Partnership Project Std., 2011.

. P.-A. Fouque, D. Pointcheval, and S. Zimmer, “HMAC is a randomness

extractor and applications to TLS,” in Proceedings of the 2008 ACM

symposium on Information, computer and communications security

(ASIACCS’08), Tokyo, Japan, Mar. 2008.

. C. Ye, A. Reznik, and Y. Shah, “Extracting secrecy from jointly

Gaussian random variables,” in Proc. Int. Symp. Inform. Theory, Jul.

, pp. 2593–2597.

. 3GPP TR 25.996 V9.0.0, 3GPP RAN1 SP-46, 3rd Generation

Partnership Project Std., 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.