ABSTRACT
This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unknown fading statistics. These methodologies have low computational complexity, automatically adapt to differences in transmitter and receiver hardware, fading distribution and temporal correlations of the fading signal to produce secret keys with uncorrelated bits. Moreover, the introduced method produces secret key bits at a higher rate than has previously been reported. We validate the method using extensive measurements between TelosB wireless sensors.
- T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. Antennas and Propagation, IEEE Transactions on, 53(11):3776--3784, 2005.Google ScholarCross Ref
- B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401--410, Nov. 2007. Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song. Random Key Predistribution Schemes for Sensor Networks. In In IEEE Symposium on Security and Privacy, 2003. Google ScholarDigital Library
- W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on information Theory, 22(6):644--654, 1976.Google ScholarDigital Library
- C. Farrow. A continuously variable digital delay element. In IEEE International Symposium on Circuits and Systems, 1988., pages 2641--2645, 1988.Google ScholarCross Ref
- H. Hashemi. The indoor radio propagation channel. Proceedings of the IEEE, 81(7):943--968, 1993.Google ScholarCross Ref
- J. Hershey, A. Hassan, and R. Yarlagadda. Unconventional cryptographic keying variable management. IEEE Trans. Commun., 43(1):3--6, Jan. 1995.Google ScholarCross Ref
- W. W. Hines, D. C. Montgomery, D. M. Goldsman, and C. M. Borror. Probability and Statistics in Engineering 4th ed. John Wiley & Sons, 2003.Google Scholar
- S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 321--332. ACM, 2009. Google ScholarDigital Library
- A. Karatsuba. The complexity of computations. In Proceedings of the Steklov Institute of Mathematics, volume 211, pages 169--183, 1995.Google Scholar
- D. Liu, P. Ning, and W. Du. Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks, 2008. Google ScholarDigital Library
- D. Malan, M. Welsh, and M. Smith. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In Sensor and Ad Hoc Communications and Networks, 2004, pages 71--80, 2004.Google ScholarCross Ref
- S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 128--139. ACM New York, NY, USA, 2008. Google ScholarDigital Library
- A. Menezes, P. Van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC, 1996. Google ScholarDigital Library
- National Institute of Standards and Technology. Special Publication 800-57: Recommendation for Key Mangement. 2007.Google Scholar
- N. Patwari and P. Agrawal. Localization Algorithms and Strategies for Wireless Sensor Networks, chapter Calibration and Measurement of Signal Strength of Sensor Localization. IGI Global, 2009.Google Scholar
- N. Patwari, J. Croft, S. Jana, and S. Kasera. High rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing, Jan 2010. http://span.ece.utah.edu/uploads/hrubeJournalr1.pdf. Google ScholarDigital Library
- A. Rukhin et al. A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications. NIST Special Publication, pages 800--822, 2001.Google Scholar
- A. Sayeed and A. Perrig. Secure wireless communications: Secret keys through multipath. In Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on, pages 3013--3016, 2008.Google ScholarCross Ref
- M. Tope and J. McEachen. Unconditionally secure communications over fading channels. In Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, volume 1, 2001.Google ScholarCross Ref
Index Terms
- Robust uncorrelated bit extraction methodologies for wireless sensors
Recommendations
Reconfigurable Antenna for Future Wireless Communication Systems
This paper deals with the processing techniques which are known as reconfigurable antennas: these methods are foreseen to be a booster for the future high rate wireless communications, both for the benefits in terms of performance and for the capacity ...
A statistical model for indoor office wireless sensor channels
Sensor networks and Ad-hoc networks, where nodes inter-communicate without fixed infrastructure, have recently attracted interest due to potential use in industrial, environmental, and safety-related applications. The fading statistics of the ...
Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration
Secret key establishment is a fundamental requirement for private communication between two entities. In this article, we propose and evaluate a new approach for secret key extraction where multiple sensors collaborate in exchanging probe packets and ...
Comments