Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Channel level crossing-based security for communications over fading channels

Several key exchange methods for wireless channels have been proposed in the literature. They are referred to as physical-layer security techniques and are usually based on the channel's fading characteristics and the principle of channel reciprocity. In this study, the authors present key exchange algorithms for wireless fading channels whose operation is based on channel estimation. Specifically, the authors present a complete key exchange scheme that includes channel sampling, thresholding and error reconciliation. Two error reconciliation methods are proposed. The first one is based on neural networks and the second one is based on linear block coding. Simulations of the proposed methods’ performances and levels of security are presented and conclusions are drawn regarding their overall utility.

References

    1. 1)
      • 3. Hershey, J., Hassan, A., Yarlagadda, R.: ‘Unconventional cryptographic keying variable management’, IEEE Trans. Commun., 1995, 43, (1), pp. 36 (doi: 10.1109/26.385951).
    2. 2)
      • 16. Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: ‘On the effectiveness of secret key extraction from wireless signal strength in real environments’. Proc. 15th Annual Int. Conf. on Mobile Computation and Network, Series MobiCom'09, 2009, pp. 321332.
    3. 3)
      • 17. Di Renzo, M., Debbah, M.: ‘Wireless physical-layer security: the challenges ahead’. Int. Conf. on Advanced Technologies for Commun., 2009 (ATC'09), 2009, pp. 313316.
    4. 4)
      • 24. Traisilanun, W., Sripimanwat, K., Sangaroon, O.: ‘Secret key reconciliation using BCH code in quantum key distribution’. Communications and Information Technologies, 2007. ISCIT'07. Int. Symp., October 2007, pp. 14821485.
    5. 5)
      • 9. Croft, J., Patwari, N., Kasera, S.K.: ‘Robust uncorrelated bit extraction methodologies for wireless sensors’. Proc. Ninth ACM/IEEE Int. Conf. on Information Processing in Sensor Networks, series IPSN'10, 2010, pp. 7081.
    6. 6)
      • 14. Wilhelm, M., Martinovic, I., Schmitt, J.B.: ‘On key agreement in wireless sensor networks based on radio transmission properties’. Fifth IEEE Workshop on Secure Netw. Protocols, 2009. NPSec 2009., October 2009, pp. 3742.
    7. 7)
      • 6. Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: ‘Using the physical layer for wireless authentication in time-variant channels’, IEEE Trans. Wirel. Commun., 2008, 7, (7), pp. 25712579 (doi: 10.1109/TWC.2008.070194).
    8. 8)
      • 23. Haykin, S.: ‘Neural networks: a comprehensive foundation’ (Prentice-Hall, 1999).
    9. 9)
      • 7. Yu, P., Baras, J., Sadler, B.: ‘Physical-layer authentication’, IEEE Trans. Inf. Forensics Sec., 2008, 3, (1), pp. 3851 (doi: 10.1109/TIFS.2007.916273).
    10. 10)
      • 19. Zafer, M., Agrawal, D., Srivatsa, M.: ‘A note on information-theoretic secret key exchange over wireless channels’. 47th Annual Allerton Conf. on Communication, Control, and Computation, 2009, 30 September 2009–2 October 2009.
    11. 11)
      • 12. Wilhelm, M., Martinovic, I., Schmitt, J.B.: ‘Key generation in wireless sensor networks based on frequency-selective channels – design, implementation, and analysis’, CoRR, 2010, http://arxiv.org/abs/1005.0712.
    12. 12)
      • 1. Diffie, W., Hellman, M.E.: ‘New directions in cryptography’, IEEE Trans. Inf. Theory, 1976, 22, (6), pp. 644654 (doi: 10.1109/TIT.1976.1055638).
    13. 13)
      • 2. Bloch, M., Barros, J.: ‘Physical-layer security’ (Cambridge University Press, 2011, 1st ed.).
    14. 14)
      • 13. Hamida, S.T.-B., Pierrot, J.-B., Castelluccia, C.: ‘An adaptive quantization algorithm for secret key generation using radio channel measurements’. Proc. Third Int. Conf. on New Technologies, Mobility and Security, series NTMS'09, 2009, pp. 5963.
    15. 15)
      • 20. Martinovic, I., Pichota, P., Schmitt, J.B.: ‘Jamming for good: a fresh approach to authentic communication in WSNs’. Proc. Second ACM Conf. on Wireless Network Security, New York, NY, USA, 2009, pp. 754761.
    16. 16)
      • 4. Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: ‘Robust key generation from signal envelopes in wireless networks’. ACM Conf. on Comput. and Commun. Security'07, 2007, pp. 401410.
    17. 17)
      • 8. Patwari, N., Croft, J., Jana, S., Kasera, S.K.: ‘High-rate uncorrelated bit extraction for shared secret key generation from channel measurements’, IEEE Trans. Mob. Comput., 2010, 9, (1), pp. 1730 (doi: 10.1109/TMC.2009.88).
    18. 18)
      • 18. Mathur, S., Reznik, A., Ye, C., Mukherjee, R., Rahman, A., Shah, Y., Trappe, W., Mandayam, N.: ‘Exploiting the physical layer for enhanced security’, IEEE Wirel. Commun., 2010, 17, (5), pp. 6370 (doi: 10.1109/MWC.2010.5601960).
    19. 19)
      • 5. Mathur, S., Ye, N.M.C., Reznik, A.: ‘Radio-telepathy: extracting a secret key from an unauthenticated wireless channel’. MobiCom'08, 2008, pp. 128139.
    20. 20)
      • 15. Forman, M., Young, D.: ‘The generation of shared cryptographic keys through half duplex channel impulse response estimation at 60 GHz’. 2010 Int. Conf. on Electromagnetics in Advanced Applications (ICEAA), 2010, pp. 627630.
    21. 21)
      • 21. Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: ‘Secret communication over fading channels’, in Ruoheng, L., Wade, T. (Ed.): ‘Securing Wireless Communications at the Physical Layer’ (Springer Publishing Company Incorporated, 2009, 1st edn.).
    22. 22)
      • 10. Zeng, K., Wu, D., Chan, A., Mohapatra, P.: ‘Exploiting multiple-antenna diversity for shared secret key generation in wireless networks’. Proc. 29th Conf. on Inf. Communication, ser. INFOCOM'10, 2010, pp. 18371845.
    23. 23)
      • 22. Hildebrand, F.B.: ‘Introduction to numerical analysis’ (McGraw-Hill, New York, 1973, 2nd ed.).
    24. 24)
      • 11. Tsouri, G.R., Wulich, D.: ‘Securing OFDM over wireless time-varying channels using subcarrier overloading with joint signal constellations’, EURASIP J. Wirel. Commun. Netw., 2009, 2009, pp. 6:16:18 (doi: 10.1155/2009/437824).
    25. 25)
      • 25. Blum, L., Blum, M., Shub, M.: ‘A simple unpredictable pseudo-random number generator’, SIAM J. Comput., 1986, 15, pp. 364383 (doi: 10.1137/0215025).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2011.0360
Loading

Related content

content/journals/10.1049/iet-ifs.2011.0360
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address