skip to main content
10.1145/1791212.1791222acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Robust uncorrelated bit extraction methodologies for wireless sensors

Published:12 April 2010Publication History

ABSTRACT

This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unknown fading statistics. These methodologies have low computational complexity, automatically adapt to differences in transmitter and receiver hardware, fading distribution and temporal correlations of the fading signal to produce secret keys with uncorrelated bits. Moreover, the introduced method produces secret key bits at a higher rate than has previously been reported. We validate the method using extensive measurements between TelosB wireless sensors.

References

  1. T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. Antennas and Propagation, IEEE Transactions on, 53(11):3776--3784, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  2. B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401--410, Nov. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks. In In IEEE Symposium on Security and Privacy, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on information Theory, 22(6):644--654, 1976.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Farrow. A continuously variable digital delay element. In IEEE International Symposium on Circuits and Systems, 1988., pages 2641--2645, 1988.Google ScholarGoogle ScholarCross RefCross Ref
  6. H. Hashemi. The indoor radio propagation channel. Proceedings of the IEEE, 81(7):943--968, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. Hershey, A. Hassan, and R. Yarlagadda. Unconventional cryptographic keying variable management. IEEE Trans. Commun., 43(1):3--6, Jan. 1995.Google ScholarGoogle ScholarCross RefCross Ref
  8. W. W. Hines, D. C. Montgomery, D. M. Goldsman, and C. M. Borror. Probability and Statistics in Engineering 4th ed. John Wiley & Sons, 2003.Google ScholarGoogle Scholar
  9. S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 321--332. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Karatsuba. The complexity of computations. In Proceedings of the Steklov Institute of Mathematics, volume 211, pages 169--183, 1995.Google ScholarGoogle Scholar
  11. D. Liu, P. Ning, and W. Du. Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Malan, M. Welsh, and M. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In Sensor and Ad Hoc Communications and Networks, 2004, pages 71--80, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  13. S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 128--139. ACM New York, NY, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Menezes, P. Van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. National Institute of Standards and Technology. Special Publication 800-57: Recommendation for Key Mangement. 2007.Google ScholarGoogle Scholar
  16. N. Patwari and P. Agrawal. Localization Algorithms and Strategies for Wireless Sensor Networks, chapter Calibration and Measurement of Signal Strength of Sensor Localization. IGI Global, 2009.Google ScholarGoogle Scholar
  17. N. Patwari, J. Croft, S. Jana, and S. Kasera. High rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing, Jan 2010. http://span.ece.utah.edu/uploads/hrubeJournalr1.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Rukhin et al. A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications. NIST Special Publication, pages 800--822, 2001.Google ScholarGoogle Scholar
  19. A. Sayeed and A. Perrig. Secure wireless communications: Secret keys through multipath. In Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, pages 3013--3016, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  20. M. Tope and J. McEachen. Unconditionally secure communications over fading channels. In Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, volume 1, 2001.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Robust uncorrelated bit extraction methodologies for wireless sensors

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IPSN '10: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
        April 2010
        460 pages
        ISBN:9781605589886
        DOI:10.1145/1791212

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 April 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate143of593submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader