Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal

Amir I. Sulimov, Alexey D. Smolyakov, Arkadij V. Karpov, Oleg N. Sherstyukov

2014

Abstract

The paper presents the results of experimental distribution of encryption keys based on random carrier phase of fading radio signal measured in a multipath environment. The random bits extraction scheme was proposed and tested in practice. The proposed scheme is universal and applicable to measurements digitizing of any observable random variable. Experimental study of spatial correlation of multipath signal phase in the case of transverse spatial diversity is carried out. Experimental estimation of the key generation rate and the probability of its passive interception at different distances between the legal user and potential eavesdropper are also performed. It is shown that the parameters of bit extraction procedure significantly affect on the performance and security of the key distribution process.

References

  1. Bennet, C.H., Brassard, G., Crepeau, C., Maurer, U.M., 1995. Generalized privacy amplification. In IEEE Transactions on Information Theory, vol.41, iss.6, pp. 1915-1923.
  2. Croft, J.E.D., 2011. Shared secret key establishment using wireless channel measurements. Ph.D. thesis, Dept. Elect. Eng., University of Utah, USA.
  3. Hamida, S.T.B., Pierrot, J.B., Castelluccia, C., 2009. An adaptive quantization algorithm for secret key generation using radio channel measurements. In NTMS'09, Proceedings of 3rd International Conference on New Technologies, Mobility and Security, pp. 1-5.
  4. Hassan, A.A., Stark, W.E., Hershey, J.E., Chennakeshu, S., 1996. Cryptographic key agreement for mobile radio. In Digital Signal Processing, vol.6, iss.4, pp. 207-212.
  5. Hershey, J.E., Hassan, A.A., Yarlagadda, R., 1995. Unconventional cryptographic keying variable management. In IEEE Transactions on Communications, vol.43., iss.1, pp.3-6.
  6. Korzhik, V., Yakovlev, V., Kovajkin, Y., 2012. Secret key agreement over multipath channels exploiting a variable-directional antenna. In International Journal of Advanced Computer Science and Applications, vol. 13, No. 1, pp. 172-178.
  7. Li, Z., Xu, W., Miller, R. and Trappe, W., 2006. Securing wireless systems via lower layer enforcements. In WiSec 7806, Proceedings of the 5th ACM workshop on Wireless Security, pp. 33-42.
  8. Liu, R. and Trappe, W., 2010. Securing wireless communications at the physical layer, Springer, NY, 396 p.
  9. Madiseh, M.G., He, S., McGuire, M.L., Neville, S.W., Dong, X., 2009. Verification of secret key generation from UWB channel observations, In ICC'09, Proceedings of the IEEE International Conference on Communications, pp. 593-597.
  10. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A., 2008. Radio-Telepathy: extracting a secret key from an unauthenticated wireless channel. In MobiCom'08, Proceedings of the 14th ACM international conference on Mobile computing and networking, pp. 128-139.
  11. Maurer, Ueli M., 1993. Protocols for secret key agreement by public discussion based on common information. In Advances in Cryptology (CRYPTO 7892). Lecture Notes in Computer Science, vol. 740, pp. 461-470.
  12. Shehadeh, E.H., Alfandi, O., Tout, K., Hogrefe, D., 2011. Intelligent mechanisms for key generation from multipath wireless channels. In WTS'2011, Proceedings of the Wireless Telecommunications Symposium, pp.1-6.
  13. Smolyakov, A.D., Sulimov, A.I., Karpov, A.V., Sherstyukov, O.N., 2013. Experimental Verification of Possibility of Secret Encryption Keys Distribution with a Phase Method In a Multipath Environment. In SIBCON-2013, Proceedings of 2013 IEEE International Siberian Conference on Control and Communications.
  14. Wei, Y., Zeng, K., Mohapatra, P., 2011. Adaptive wireless channel probing for shared key generation based on PID Controller. In Proceedings of IEEE INFOCOM'2011, pp. 2165-2173.
  15. Wilhelm, M., Martinovich, I., Schmitt, J.B., 2010. Secret key from entangled sensor motes: implementation and analysis. In WiSec'10, Proceedings of the 3rd ACM conference on Wireless network security, pp. 139-144. Wilson, R., Tse, D., Scholtz, R.A., 2007. Channel identification: Secret sharing using reciprocity in ultrawideband channels. In Proceedings of IEEE Transactions on Information Forensics and Security, Part 1, vol.2, iss.3, pp. 364-375.
  16. Zan, B., Gruteser, M., Hu, F., 2012. Improving robustness of key extraction from wireless channels with differential techniques. In ICNC'2012, Proceedings of International Conference on Computing, Networking and Communications, pp. 980-984.
Download


Paper Citation


in Harvard Style

Sulimov A., D. Smolyakov A., V. Karpov A. and N. Sherstyukov O. (2014). Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 411-416. DOI: 10.5220/0005101004110416


in Bibtex Style

@conference{secrypt14,
author={Amir I. Sulimov and Alexey D. Smolyakov and Arkadij V. Karpov and Oleg N. Sherstyukov},
title={Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={411-416},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005101004110416},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal
SN - 978-989-758-045-1
AU - Sulimov A.
AU - D. Smolyakov A.
AU - V. Karpov A.
AU - N. Sherstyukov O.
PY - 2014
SP - 411
EP - 416
DO - 10.5220/0005101004110416