Performance Evaluation of Meteor Key Distribution

Amir I. Sulimov, Arkadiy V. Karpov

2015

Abstract

The Wireless Key Distribution is a fast growing area of applied cryptography covering different approaches of secure distribution of secret encryption key based on channel stochastic properties in specific radio communication systems. To be applicable in key distribution purposes the radio channel must meet the three basic requirements: randomness, reciprocity and spatial selectivity. For a long time it was believed that only the fading channels in multipath environment could satisfy all the three requirements. However, several studies also considered a meteor burst channel as a potential candidate for the secure key distribution at distances up to 2000 km. Unfortunately, a rigorous analysis of meteor radio propagation processes shows that the channel has only approximate reciprocity. This may result in the two legitimate nodes would not be able to generate identical copies of the shared secret key indicating that the Meteor Key Distribution is impossible in practice. In addition, a complicated astronomical nature of the meteor burst channel causes deep diurnal variation in its performance. The aim of our research was a comprehensive evaluation of potential performance of the Meteor Key Distribution systems, taking into account all the physical layer effects of meteor burst channel. We also wanted to clarify, how strong the imperfection of a real meteor burst channel affects the key distribution feasibility.

References

  1. Bennett, C. H., Brassard, G., 1984. Quantum Cryptography: Public key distribution and coin tossing. In Proc. of IEEE Int. Conf. on Computers, Systems and Signal Processing, pp. 175-179.
  2. Bennett, C. H., Brassard, G., Crepeau, C., Maurer, U. M., 1995. Generalized privacy amplification. In IEEE Trans. on Inf. Theory, vol.41, iss.6, pp. 1915-1923.
  3. Croft, J. E. D., 2011. Shared secret key establishment using wireless channel measurements. Ph.D. thesis, Dept. Elect. Eng., University of Utah, USA.
  4. Desourdis, R. J., Wojtaszek, H., Sidorov, V. V. et al., 1993. Nonreciprocity of Meteor Scatter Radio Links. In IES'93, Proc. of Ionosph. Effects Symp., pp. 165- 173.
  5. Hershey, J. E., Hassan, A. A., Yarlagadda, R., 1995. Unconventional cryptographic keying variable management. In IEEE Trans. on Communications, vol. 43., iss.1, pp.3-6.
  6. Karpov, A., Tereshin, S., Abrosimov, J., 2001. The computer model “KAMET”: The new generation version. In Proc. of the Meteroids 2001 Conf., pp.367- 370.
  7. Khuzyashev, R. G., 1984. Calculation of the amplitude and phase characteristics of a signal scattered obliquely off a meteor trail. In Radiophysics and Quantum Electronics, vol.27, iss.9, pp.778-782.
  8. Liu, H., Yang, J. et al., 2014. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates and Implementation. In IEEE Trans. on Mobile Computing, vol.13, iss.12, pp.2820-2835.
  9. McKinley, D. W. R., 1961. Meteor science and engineering, McGraw-Hill, 309 p.
  10. Sidorov, V. V., Karpov, A. V., Korneev, V. A., Nasyrov, A.F., 2007. Meteor Time Transfer and Meteor Cryptography. In TimeNav'07, Proc. of 21st European Frequency and Time Forum, pp. 315-317.
  11. Smolyakov, A. D., Sulimov, A. I., Karpov, A. V., Sherstyukov, O.N., 2013. Experimental Verification of Possibility of Secret Encryption Keys Distribution with a Phase Method In a Multipath Environment. In SIBCON-2013, Proc. of 2013 IEEE Int. Siberian Conf. on Control and Communications.
  12. Sulimov, A.I., Karpov, A.V., 2014. Secure Key Distribution based on Meteor Burst Communications. In Proc. of the 11th Int. Conf. on Security and Cryptography (SECRYPT-2014), pp. 445-450.
  13. Sulimov, A. I., Smolyakov, A. D., Karpov, A. V., Sherstyukov, O.N., 2014. Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal. In Proc. of the 11th Int. Conf. on Security and Cryptography (SECRYPT-2014), pp. 411-416.
  14. Weitzen, J. A., Sowa, M., Scofidio, R., Quinn, J., 1987. Characterizing the Multipath and Doppler Spreads of the High-Latitude Meteor Burst Communication Channel. In IEEE Trans. on Communications, vol.35, pp.1050-1058.
Download


Paper Citation


in Harvard Style

I. Sulimov A. and V. Karpov A. (2015). Performance Evaluation of Meteor Key Distribution . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 392-397. DOI: 10.5220/0005568003920397


in Bibtex Style

@conference{secrypt15,
author={Amir I. Sulimov and Arkadiy V. Karpov},
title={Performance Evaluation of Meteor Key Distribution},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={392-397},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005568003920397},
isbn={978-989-758-117-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Performance Evaluation of Meteor Key Distribution
SN - 978-989-758-117-5
AU - I. Sulimov A.
AU - V. Karpov A.
PY - 2015
SP - 392
EP - 397
DO - 10.5220/0005568003920397