Unleashing the secure potential of the wireless physical layer: Secret key generation methods

Physical Communication - Tập 19 - Trang 1-10 - 2016
Ahmed Badawy1, Tarek Elfouly2, Tamer Khattab3, Amr Mohamed2, Mohsen Guizani2
1Politecnico di Torino - DET, Italy
2Qatar University, Electrical Engineering Department, Qatar
3Qatar University, Computer Engineering Department, Qatar

Tài liệu tham khảo

Mukherjee, 2014, Principles of physical layer security in multiuser wireless networks: A survey, IEEE Commun. Surv. Tutor., 16, 1550, 10.1109/SURV.2014.012314.00178 Wyner, 1975, The wire-tap channel, Bell Syst. Tech. J., 54, 1355, 10.1002/j.1538-7305.1975.tb02040.x Wilson, 2007, Channel identification: Secret sharing using reciprocity in ultrawideband channels, IEEE Trans. Inf. Forensics Secur., 2, 364, 10.1109/TIFS.2007.902666 Kitaura, 2007, A scheme of secret key agreement based on received signal strength variation by antenna switching in land mobile radio, 1763 Gungor, 2014, Secret key generation via localization and mobility, IEEE Trans. Veh. Technol., PP, 1 S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel, in: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom ’08, 2008, pp. 128–139. Z. Li, W. Xu, R. Miller, W. Trappe, Securing wireless systems via lower layer enforcements, in: Proceedings of the 5th ACM Workshop on Wireless Security, WiSe ’06, 2006, pp. 33–42. Hassan, 1996, Cryptographic key agreement for mobile radio, Digit. Signal Process., 6, 207, 10.1006/dspr.1996.0023 Koorapaty, 1998, Secure information transmission for mobile radio, 381 Wang, 2012, Cooperative secret key generation from phase estimation in narrowband fading channels, IEEE J. Sel. Areas Commun., 30, 1666, 10.1109/JSAC.2012.121010 A. Badawy, T. Khattab, T.M. Elfouly, C.-F. Chiasserini, A. Mohamed, D. Trinchero, Channel secondary random process for robust secret key generation, in: IWCMC 2015 Security Symposium, IWCMC 2015 Security Symposium, Dubrovnik, Croatia, 2015. Patwari, 2010, High-rate uncorrelated bit extraction for shared secret key generation from channel measurements, IEEE Trans. Mobile Comput., 9, 17, 10.1109/TMC.2009.88 Premnath, 2013, Secret key extraction from wireless signal strength in real environments, IEEE Trans. Mobile Comput., 12, 917, 10.1109/TMC.2012.63 Ren, 2011, Secret key generation exploiting channel characteristics in wireless communications, IEEE Wirel. Commun., 18, 6, 10.1109/MWC.2011.5999759 N. Patwari, A.O. Hero III, Using proximity and quantized rss for sensor localization in wireless networks, in: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, WSNA ’03, 2003, pp. 20–29. A. Badawy, T. Khattab, T. Elfouly, D. Mohamed, A. Trinchero, C. Chiasserini, Secret key generation based on aoa estimation for low snr conditions, in: 2015 IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–7. S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, On the effectiveness of secret key extraction from wireless signal strength in real environments, in: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MobiCom ’09, 2009, pp. 321–332. Liu, 2012, Collaborative secret key extraction leveraging received signal strength in mobile wireless networks, 927 Aono, 2005, Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels, IEEE Trans. Antennas Propag., 53, 3776, 10.1109/TAP.2005.858853 Zhang, 2010, Mobility assisted secret key generation using wireless link signatures, 1 Brassard, 1994, 410 Bloch, 2008, Wireless information-theoretic security, IEEE Trans. Inform. Theory, 54, 2515, 10.1109/TIT.2008.921908 Liu, 2012, Exploiting channel diversity in secret key generation from multipath fading randomness, IEEE Trans. Inf. Forensics Secur., 7, 1484, 10.1109/TIFS.2012.2206385 Thai, 2014, Physical-layer secret key generation with untrusted relays, 1385 Badawy, 2014, Secret key generation based on channel and distance measurements, 136 Maurer, 1993, Secret key agreement by public discussion from common information, IEEE Trans. Inform. Theory, 39, 733, 10.1109/18.256484 Gungor, 2012, Secrecy outage capacity of fading channels, 1 Menezes, 2001 Nist: Computer security resource center. URL http://csrc.nist.gov. Nist — csrs: Public key interoperability test suite certification path validation. URL http://csrc.nist.gov/groups/ST/crypto_apps_infra/documents/PKITS.pdf. Ye, 2007, On the secrecy capabilities of itu channels, 2030 Saad, 2015, Comparative simulation for physical layer key generation methods, 120