access icon free Channel level crossing-based security for communications over fading channels

Several key exchange methods for wireless channels have been proposed in the literature. They are referred to as physical-layer security techniques and are usually based on the channel's fading characteristics and the principle of channel reciprocity. In this study, the authors present key exchange algorithms for wireless fading channels whose operation is based on channel estimation. Specifically, the authors present a complete key exchange scheme that includes channel sampling, thresholding and error reconciliation. Two error reconciliation methods are proposed. The first one is based on neural networks and the second one is based on linear block coding. Simulations of the proposed methods’ performances and levels of security are presented and conclusions are drawn regarding their overall utility.

Inspec keywords: telecommunication computing; block codes; sampling methods; channel estimation; telecommunication security; neural nets; linear codes; fading channels

Other keywords: channel reciprocity; key exchange algorithms; channel sampling; channel level crossing-based security; error reconciliation methods; channel estimation; neural networks; wireless fading channels; linear block coding; channel thresholding; physical-layer security techniques

Subjects: Communication channel equalisation and identification; Other topics in statistics; Radio links and equipment; Codes; Neural computing techniques; Other topics in statistics; Communications computing

References

    1. 1)
      • 3. Hershey, J., Hassan, A., Yarlagadda, R.: ‘Unconventional cryptographic keying variable management’, IEEE Trans. Commun., 1995, 43, (1), pp. 36 (doi: 10.1109/26.385951).
    2. 2)
      • 16. Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: ‘On the effectiveness of secret key extraction from wireless signal strength in real environments’. Proc. 15th Annual Int. Conf. on Mobile Computation and Network, Series MobiCom'09, 2009, pp. 321332.
    3. 3)
      • 17. Di Renzo, M., Debbah, M.: ‘Wireless physical-layer security: the challenges ahead’. Int. Conf. on Advanced Technologies for Commun., 2009 (ATC'09), 2009, pp. 313316.
    4. 4)
      • 24. Traisilanun, W., Sripimanwat, K., Sangaroon, O.: ‘Secret key reconciliation using BCH code in quantum key distribution’. Communications and Information Technologies, 2007. ISCIT'07. Int. Symp., October 2007, pp. 14821485.
    5. 5)
      • 9. Croft, J., Patwari, N., Kasera, S.K.: ‘Robust uncorrelated bit extraction methodologies for wireless sensors’. Proc. Ninth ACM/IEEE Int. Conf. on Information Processing in Sensor Networks, series IPSN'10, 2010, pp. 7081.
    6. 6)
      • 14. Wilhelm, M., Martinovic, I., Schmitt, J.B.: ‘On key agreement in wireless sensor networks based on radio transmission properties’. Fifth IEEE Workshop on Secure Netw. Protocols, 2009. NPSec 2009., October 2009, pp. 3742.
    7. 7)
      • 6. Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: ‘Using the physical layer for wireless authentication in time-variant channels’, IEEE Trans. Wirel. Commun., 2008, 7, (7), pp. 25712579 (doi: 10.1109/TWC.2008.070194).
    8. 8)
      • 23. Haykin, S.: ‘Neural networks: a comprehensive foundation’ (Prentice-Hall, 1999).
    9. 9)
      • 7. Yu, P., Baras, J., Sadler, B.: ‘Physical-layer authentication’, IEEE Trans. Inf. Forensics Sec., 2008, 3, (1), pp. 3851 (doi: 10.1109/TIFS.2007.916273).
    10. 10)
      • 19. Zafer, M., Agrawal, D., Srivatsa, M.: ‘A note on information-theoretic secret key exchange over wireless channels’. 47th Annual Allerton Conf. on Communication, Control, and Computation, 2009, 30 September 2009–2 October 2009.
    11. 11)
      • 12. Wilhelm, M., Martinovic, I., Schmitt, J.B.: ‘Key generation in wireless sensor networks based on frequency-selective channels – design, implementation, and analysis’, CoRR, 2010, http://arxiv.org/abs/1005.0712.
    12. 12)
      • 1. Diffie, W., Hellman, M.E.: ‘New directions in cryptography’, IEEE Trans. Inf. Theory, 1976, 22, (6), pp. 644654 (doi: 10.1109/TIT.1976.1055638).
    13. 13)
      • 2. Bloch, M., Barros, J.: ‘Physical-layer security’ (Cambridge University Press, 2011, 1st ed.).
    14. 14)
      • 13. Hamida, S.T.-B., Pierrot, J.-B., Castelluccia, C.: ‘An adaptive quantization algorithm for secret key generation using radio channel measurements’. Proc. Third Int. Conf. on New Technologies, Mobility and Security, series NTMS'09, 2009, pp. 5963.
    15. 15)
      • 20. Martinovic, I., Pichota, P., Schmitt, J.B.: ‘Jamming for good: a fresh approach to authentic communication in WSNs’. Proc. Second ACM Conf. on Wireless Network Security, New York, NY, USA, 2009, pp. 754761.
    16. 16)
      • 4. Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: ‘Robust key generation from signal envelopes in wireless networks’. ACM Conf. on Comput. and Commun. Security'07, 2007, pp. 401410.
    17. 17)
      • 8. Patwari, N., Croft, J., Jana, S., Kasera, S.K.: ‘High-rate uncorrelated bit extraction for shared secret key generation from channel measurements’, IEEE Trans. Mob. Comput., 2010, 9, (1), pp. 1730 (doi: 10.1109/TMC.2009.88).
    18. 18)
      • 18. Mathur, S., Reznik, A., Ye, C., Mukherjee, R., Rahman, A., Shah, Y., Trappe, W., Mandayam, N.: ‘Exploiting the physical layer for enhanced security’, IEEE Wirel. Commun., 2010, 17, (5), pp. 6370 (doi: 10.1109/MWC.2010.5601960).
    19. 19)
      • 5. Mathur, S., Ye, N.M.C., Reznik, A.: ‘Radio-telepathy: extracting a secret key from an unauthenticated wireless channel’. MobiCom'08, 2008, pp. 128139.
    20. 20)
      • 15. Forman, M., Young, D.: ‘The generation of shared cryptographic keys through half duplex channel impulse response estimation at 60 GHz’. 2010 Int. Conf. on Electromagnetics in Advanced Applications (ICEAA), 2010, pp. 627630.
    21. 21)
      • 21. Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: ‘Secret communication over fading channels’, in Ruoheng, L., Wade, T. (Ed.): ‘Securing Wireless Communications at the Physical Layer’ (Springer Publishing Company Incorporated, 2009, 1st edn.).
    22. 22)
      • 10. Zeng, K., Wu, D., Chan, A., Mohapatra, P.: ‘Exploiting multiple-antenna diversity for shared secret key generation in wireless networks’. Proc. 29th Conf. on Inf. Communication, ser. INFOCOM'10, 2010, pp. 18371845.
    23. 23)
      • 22. Hildebrand, F.B.: ‘Introduction to numerical analysis’ (McGraw-Hill, New York, 1973, 2nd ed.).
    24. 24)
      • 11. Tsouri, G.R., Wulich, D.: ‘Securing OFDM over wireless time-varying channels using subcarrier overloading with joint signal constellations’, EURASIP J. Wirel. Commun. Netw., 2009, 2009, pp. 6:16:18 (doi: 10.1155/2009/437824).
    25. 25)
      • 25. Blum, L., Blum, M., Shub, M.: ‘A simple unpredictable pseudo-random number generator’, SIAM J. Comput., 1986, 15, pp. 364383 (doi: 10.1137/0215025).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2011.0360
Loading

Related content

content/journals/10.1049/iet-ifs.2011.0360
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading