Browse > Article
http://dx.doi.org/10.7840/kics.2014.39A.12.708

A Novel Distributed Secret Key Extraction Technique for Wireless Network  

Im, Sanghun (Korea Institute of Science And Technology)
Jeon, Hyungsuk (Korea Institute of Science And Technology)
Ha, Jeongseok (Korea Institute of Science And Technology)
Abstract
In this paper, we present a secret key distribution protocol without resorting to a key management infrastructure targeting at providing a low-complexity distributed solution to wireless network. The proposed scheme extracts a secret key from the random fluctuation of wireless channels. By exploiting time division duplexing transmission, two legitimate users, Alice and Bob can have highly correlated channel gains due to channel reciprocity, and a pair of random bit sequences can be generated by quantizing the channel gains. We propose a novel adaptive quantization scheme that adjusts quantization thresholds according to channel variations and reduces the mismatch probability between generated bit sequences by Alice and Bob. BCH codes, as a low-complexity and pratical approach, are also employed to correct the mismatches between the pair of bit sequences and produce a secret key shared by Alice and Bob. To maximize the secret key extraction rate, the parameters, quantization levels and code rates of BCH codes are jointly optimized.
Keywords
Adaptive Quantization; Key Extraction; Key Distribution; Wireless Network;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 임용재 외 2, "미래 인터넷의 진화방향: Internet of Things," PM Issue Report 2012, vol. 2, no. 1, 2012.
2 W. B. Davenport, Jr. and W. L. Root, An Introduction to the Theory of Random Signals and Noise, NY: McGraw-Hill, 1958.
3 W. C. Jakes, Microwave Mobile Communications, NY: IEEE Press, 1974.
4 NIST, A statistical test suite for random and pseudorandom number generators for cryptographic applications, 800th Ed., National Institute of Standards and Technology, 2001.
5 김동희 외 2, "IoT 서비스를 위한 보안," Inf. Commun. Mag., vol. 30, no. 8, pp. 53-59, 2013.   과학기술학회마을
6 J. Park, S. Shin, and N. Kang, "Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things," J. KICS, vol., 38B no. 09, pp. 707-714, 2013.   과학기술학회마을   DOI
7 R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, Part I: secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.   DOI   ScienceOn
8 U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.   DOI   ScienceOn
9 C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol. 5, pp. 3-28, 1992.
10 C. Bennett, G. Brassard, C. Crepeau, and U. Maurer, "Generalized privacy amplification," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.   DOI   ScienceOn
11 B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. ACM Comput. Commun. Security, pp. 401-410, Oct. 2007.
12 N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mob. Comput., vol. 9, no. 1, pp. 17-30, Jan. 2010.   DOI   ScienceOn
13 M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comp. Syst. Sci., vol. 22, pp. 265-279, 1981.   DOI
14 C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly gaussian random variables," in Proc. IEEE Int. Symp. Inf. Theory, pp. 2593-2597, Jul. 2006.
15 S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. ACM Int. Conf. Mob. Comput. Netw. (MobiCom '08), pp. 128-139, San Francisco, CA, Sept. 2008.
16 J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comp. Syst. Sci., vol. 18, pp. 143-154, 1979.   DOI   ScienceOn