Abstract
When Alice and Bob can observe a common wireless radio channel, it is possible to extract secrets between them. As the wireless channel coefficients over time are generally correlated, it is a common challenge to perform decorrelation efficiently for various secret key generation schemes. In the literature, it was reported that the Karhunen-Lo\(\grave{\text {e}}\)ve (K-L) transform for decorrelation is very sensitive in implementation and often the channel covariance at the side of Alice should be finely transferred to Bob, which is very expensive. In this paper, we provide some insights on the sensitivity of K-L transform, which can be well exploited to develop an improved version of K-L transform for removing this sensitivity. Since the K-L transform is very expensive in complexity, we further propose a linear prediction self-filtering approach at both sides for decorrelation. The theoretical analysis show that its performance is insensitive to the impairment of the wireless channel coefficients observed at different sides, which is further validated by simulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahlswede, R., Csiszar, I.: Common randomness in information theory and cryptography secret sharing. IEEE Trans. Info. Theory 39, 1121–1132 (1993). https://doi.org/10.1109/18.243431
Maurer, U.M.: Secret key agreement by discussion from common information. IEEE Trans. Info. Theory. 39, 733–742 (1993). https://doi.org/10.1109/18.256484
Hershey, E.J., Hassan, A.A., Yarlagadda, R.: Unconventional cryptographic keying variable management. IEEE Trans. Commun. 43, 3–6 (1995). https://doi.org/10.1109/26.385951
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of 14th ACM International Conference Mobile Computing Network, San Francisco, California, USA (2008). https://doi.org/10.1145/1409944.1409960
Kitaura, A., Sumi, T., Tachibana, K., Iwai, H., Sasaoka, H.: A scheme of private key agreement based on delay profiles in UWB systems. In: Proceedings of IEEE Sarnoff Symposium, pp. 1–6, Princeton, NJ, USA (2006). https://doi.org/10.1109/SARNOF.2006.4534731
Wilson, R., Tse, D., Scholtz, R.: Channel identification: secret sharing using reciprocity in UWB channels. IEEE Trans. Info. Forensics Secur. 2, 364–375 (2007). https://doi.org/10.1109/TIFS.2007.902666
Ye, C., Reznik, A., Shah, Y.: Extracting secrecy from jointly Gaussian random variables. In: Proceedings of IEEE International Symposium Information Theory, pp. 2593–2597, Seattle, WA, USA (2006). https://doi.org/10.1109/ISIT.2006.262101
Ye, C., Mathur, S., Reznik, A., Reznik, A., Shah, Y., Trappe, W., Mandayam, N.B.: Information-theoretically secret key generation for fading wireless channels. IEEE Trans. Info. Forensics Secur. 5, 240–254 (2010). https://doi.org/10.1109/TIFS.2010.2043187
Patwari, N., Croft, J., Jana, S.: High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mobile Comput. 9, 17–30 (2009). https://doi.org/10.1109/TMC.2009.88
Chen, C., Jensen, A.M.: Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Trans. Mobile Comput. 10, 205–215 (2011). https://doi.org/10.1109/TMC.2010.114
Jana, S., Premnath, N.S., Clark, M., Kasera, K.S., Patwari, N., Krishnamurthy, V.S.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of 15th ACM International Conference Mobile Computing Network, pp. 321–332, Beijing, China (2009). https://doi.org/10.1145/1614320.1614356
Durgin, G.D.: Space-Time Wireless Channels. Prentice Hall PTR, Upper Saddle River (2002)
Tope, M.A., McEachen, J.C.: Unconditionally secure communications over fading channels. In: Proceedings of IEEE MILCOM, pp. 54–58, McLean, VA, USA (2001). https://doi.org/10.1109/MILCOM.2001.985763
Chen, C., Jensen, M.A.: Improved channel quantization for secret key establishment in wireless systems. In: Proceedings of IEEE ICWITS, pp. 1–4, Honolulu, HI, USA (2010). https://doi.org/10.1109/ICWITS.2010.5611930
Wallace, J.W.: Secure physical layer key generation schemes: performance and information theoretic limits. In: Proceedings of IEEE International Conference on Communications, Dresden, Germany (2009). https://doi.org/10.1109/ICC.2009.5199440
NIST: A statistical test suite for random and pseudorandom number generators for cryptographic applications (2002). http://csrc.nist.gov
Cao, Z., Wu, X., Zhu, W., Cui, J.: Eliminating privacy amplification in secret key generation from wireless channels. In: Proceedings of CHINACOM 2015, pp. 266–271 (2015). https://doi.org/10.1109/CHINACOM.2015.7497949
Zheng, Y.R., Xiao, C.: Simulation models with correct statistical properties for Rayleigh fading channels. IEEE Trans. Commun. 51, 920–928 (2003). https://doi.org/10.1109/TCOMM.2003.813259
Acknowledgment
This work was supported in part by the National Natural Science Foundation of China under Grant 61372123. The work of Wu was also supported by the Scientific Research Foundation of Nanjing University of Posts and Telecommunications under Grant NY213002, and by the Key University Science Research Project of Jiangsu Province under Grant 14KJA510003.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wu, X., Dai, D., Yu, X., Yan, J. (2019). Decorrelation of Wireless Channel Coefficients for Secret Key Generation. In: Hwang, S., Tan, S., Bien, F. (eds) Proceedings of the Sixth International Conference on Green and Human Information Technology. ICGHIT 2018. Lecture Notes in Electrical Engineering, vol 502. Springer, Singapore. https://doi.org/10.1007/978-981-13-0311-1_26
Download citation
DOI: https://doi.org/10.1007/978-981-13-0311-1_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0310-4
Online ISBN: 978-981-13-0311-1
eBook Packages: EngineeringEngineering (R0)