ABSTRACT
We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. We use real world measurements of RSS in a variety of environments and settings. Our experimental results show that (i) in certain environments, due to lack of variations in the wireless channel, the extracted bits have very low entropy making these bits unsuitable for a secret key, (ii) an adversary can cause predictable key generation in these static environments, and (iii) in dynamic scenarios where the two devices are mobile, and/or where there is a significant movement in the environment, high entropy bits are obtained fairly quickly. Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive lossy quantizer in conjunction with Cascade-based information reconciliation [7] and privacy amplification [14]. Our measurements show that our scheme, in comparison to the existing ones that we evaluate, performs the best in terms of generating high entropy bits at a high bit rate. The secret key bit streams generated by our scheme also pass the randomness tests of the NIST test suite [21] that we conduct.
- http://homepages.tu-darmstadt.de/Üp_larbig/wlan/.Google Scholar
- http://www.radiotap.org.Google Scholar
- http://www.wildpackets.com/elements/whitepapers/Converting_Signal_Strength.pdf.Google Scholar
- T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation, 53(11):3776--3784, Nov. 2005.Google ScholarCross Ref
- B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401--410, Nov. 2007. Google ScholarDigital Library
- C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin. Experimental quantum cryptography. J. Cryptol., 5(1):3--28, 1992. Google ScholarCross Ref
- G. Brassard and L. Salvail. Secret key reconciliation by public discussion. Lecture Notes in Computer Science, 765:410--423, 1994.Google ScholarDigital Library
- V. Brik, S. Banerjee, M. Gruteser, and S. Oh. PARADIS: Wireless device identification with radiometric signatures. In ACM MOBICOM Conference, Sept. 2008. Google ScholarDigital Library
- Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In EUROCRYPT, pages 523--540, 2004.Google ScholarCross Ref
- G. D. Durgin. Space-Time Wireless Channels. Prentice Hall PTR, 2002. Google ScholarDigital Library
- L. Greenemeier. Election Fix? Switzerland Tests Quantum Cryptography. Scientific American, October 2007.Google Scholar
- A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu. Cryptographic key agreement for mobile radio. Digital Signal Processing, 6:207--212, 1996.Google ScholarCross Ref
- J. E. Hershey, A. A. Hassan, and R. Yarlagadda. Unconventional cryptographic keying variable management. IEEE Trans. Commun., 43(1):3--6, Jan. 1995.Google ScholarCross Ref
- R. Impagliazzo, L. A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In STOC, 1989. Google ScholarDigital Library
- S. Jana and S. K. Kasera. On fast and accurate detection of unauthorized access points using clock skews. In ACM MOBICOM Conference, Sept. 2008. Google ScholarDigital Library
- Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wireless systems via lower layer enforcements. In Proc. 5th ACM Workshop on Wireless Security (WiSe'06), pages 33--42, Sept. 2006. Google ScholarDigital Library
- M. G. Madiseh, M. L. McGuire, S. W. Neville, and A. A. B. Shirazi. Secret key extraction in ultra wideband channels for unsynchronized radios. In CNSR, May 2008. Google ScholarDigital Library
- S. Mathur, W. Trappe, N. B. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In ACM MOBICOM Conference, Sept. 2008. Google ScholarDigital Library
- U. M. Maurer. Secret key agreement by public discussion from common information. IEEE Trans. Info. Theory, 39(3):733--742, May 1993.Google ScholarDigital Library
- U. M. Maurer and S. Wolf. Unconditionally secure key agreement and the intrinsic conditional information. IEEE Trans. Info. Theory, 45(2):499--514, 1999. Google ScholarDigital Library
- NIST. A statistical test suite for random and pseudorandom number generators for cryptographic applications, 2001.Google Scholar
- A. Sayeed and A. Perrig. Secure wireless communications: Secret keys through multipath. In IEEE Int. Conf. Acoustic, Speech&Signal Processing (ICASSP'08), pages 3013--3016, April 2008.Google ScholarCross Ref
- C. E. Shannon. A mathematical theory of communication. Bell system technical journal, 27, 1948.Google Scholar
- M. A. Tope and J. C. McEachen. Unconditionally secure communications over fading channels. In Military Communications Conference (MILCOM 2001), volume 1, pages 54--58, Oct. 2001.Google ScholarCross Ref
- S. Wiesner. Conjugate coding. SIGACT News, 15(1):78--88, 1983. Google ScholarDigital Library
- R. Wilson, D. Tse, and R. A. Scholtz. Channel identification: Secret sharing using reciprocity in UWB channels. IEEE Transactions on Information Forensics and Security, 2(3):364--375, Sept. 2007. Google ScholarDigital Library
- C. Ye, A. Reznik, and Y. Shah. Extracting secrecy from jointly gaussian random variables. In 2006 IEEE International Symposium on Information Theory (ISIT'06), pages 2593--2597, July 2006.Google ScholarCross Ref
- C. Ye, A. Reznik, G. Sternberg, and Y. Shah. On the secrecy capabilities of ITU channels. In IEEE VTC'07-Fall, pages 2030--2034, Oct. 2007.Google ScholarCross Ref
Recommendations
Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration
Secret key establishment is a fundamental requirement for private communication between two entities. In this article, we propose and evaluate a new approach for secret key extraction where multiple sensors collaborate in exchanging probe packets and ...
Secret Key Extraction from Wireless Signal Strength in Real Environments
We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. We use real world measurements of RSS in ...
Robust location distinction using temporal link signatures
MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networkingThe ability of a receiver to determine when a transmitter has changed location is important for energy conservation in wireless sensor networks, for physical security of radio-tagged objects, and for wireless network security in detection of replication ...
Comments