Skip to main content

Decorrelation of Wireless Channel Coefficients for Secret Key Generation

  • Conference paper
  • First Online:
Proceedings of the Sixth International Conference on Green and Human Information Technology (ICGHIT 2018)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 502))

Included in the following conference series:

  • 539 Accesses

Abstract

When Alice and Bob can observe a common wireless radio channel, it is possible to extract secrets between them. As the wireless channel coefficients over time are generally correlated, it is a common challenge to perform decorrelation efficiently for various secret key generation schemes. In the literature, it was reported that the Karhunen-Lo\(\grave{\text {e}}\)ve (K-L) transform for decorrelation is very sensitive in implementation and often the channel covariance at the side of Alice should be finely transferred to Bob, which is very expensive. In this paper, we provide some insights on the sensitivity of K-L transform, which can be well exploited to develop an improved version of K-L transform for removing this sensitivity. Since the K-L transform is very expensive in complexity, we further propose a linear prediction self-filtering approach at both sides for decorrelation. The theoretical analysis show that its performance is insensitive to the impairment of the wireless channel coefficients observed at different sides, which is further validated by simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahlswede, R., Csiszar, I.: Common randomness in information theory and cryptography secret sharing. IEEE Trans. Info. Theory 39, 1121–1132 (1993). https://doi.org/10.1109/18.243431

    Article  MathSciNet  MATH  Google Scholar 

  2. Maurer, U.M.: Secret key agreement by discussion from common information. IEEE Trans. Info. Theory. 39, 733–742 (1993). https://doi.org/10.1109/18.256484

    Article  MathSciNet  MATH  Google Scholar 

  3. Hershey, E.J., Hassan, A.A., Yarlagadda, R.: Unconventional cryptographic keying variable management. IEEE Trans. Commun. 43, 3–6 (1995). https://doi.org/10.1109/26.385951

    Article  MATH  Google Scholar 

  4. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of 14th ACM International Conference Mobile Computing Network, San Francisco, California, USA (2008). https://doi.org/10.1145/1409944.1409960

  5. Kitaura, A., Sumi, T., Tachibana, K., Iwai, H., Sasaoka, H.: A scheme of private key agreement based on delay profiles in UWB systems. In: Proceedings of IEEE Sarnoff Symposium, pp. 1–6, Princeton, NJ, USA (2006). https://doi.org/10.1109/SARNOF.2006.4534731

  6. Wilson, R., Tse, D., Scholtz, R.: Channel identification: secret sharing using reciprocity in UWB channels. IEEE Trans. Info. Forensics Secur. 2, 364–375 (2007). https://doi.org/10.1109/TIFS.2007.902666

    Article  Google Scholar 

  7. Ye, C., Reznik, A., Shah, Y.: Extracting secrecy from jointly Gaussian random variables. In: Proceedings of IEEE International Symposium Information Theory, pp. 2593–2597, Seattle, WA, USA (2006). https://doi.org/10.1109/ISIT.2006.262101

  8. Ye, C., Mathur, S., Reznik, A., Reznik, A., Shah, Y., Trappe, W., Mandayam, N.B.: Information-theoretically secret key generation for fading wireless channels. IEEE Trans. Info. Forensics Secur. 5, 240–254 (2010). https://doi.org/10.1109/TIFS.2010.2043187

    Article  Google Scholar 

  9. Patwari, N., Croft, J., Jana, S.: High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans. Mobile Comput. 9, 17–30 (2009). https://doi.org/10.1109/TMC.2009.88

    Article  Google Scholar 

  10. Chen, C., Jensen, A.M.: Secret key establishment using temporally and spatially correlated wireless channel coefficients. IEEE Trans. Mobile Comput. 10, 205–215 (2011). https://doi.org/10.1109/TMC.2010.114

    Article  Google Scholar 

  11. Jana, S., Premnath, N.S., Clark, M., Kasera, K.S., Patwari, N., Krishnamurthy, V.S.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of 15th ACM International Conference Mobile Computing Network, pp. 321–332, Beijing, China (2009). https://doi.org/10.1145/1614320.1614356

  12. Durgin, G.D.: Space-Time Wireless Channels. Prentice Hall PTR, Upper Saddle River (2002)

    Google Scholar 

  13. Tope, M.A., McEachen, J.C.: Unconditionally secure communications over fading channels. In: Proceedings of IEEE MILCOM, pp. 54–58, McLean, VA, USA (2001). https://doi.org/10.1109/MILCOM.2001.985763

  14. Chen, C., Jensen, M.A.: Improved channel quantization for secret key establishment in wireless systems. In: Proceedings of IEEE ICWITS, pp. 1–4, Honolulu, HI, USA (2010). https://doi.org/10.1109/ICWITS.2010.5611930

  15. Wallace, J.W.: Secure physical layer key generation schemes: performance and information theoretic limits. In: Proceedings of IEEE International Conference on Communications, Dresden, Germany (2009). https://doi.org/10.1109/ICC.2009.5199440

  16. NIST: A statistical test suite for random and pseudorandom number generators for cryptographic applications (2002). http://csrc.nist.gov

  17. Cao, Z., Wu, X., Zhu, W., Cui, J.: Eliminating privacy amplification in secret key generation from wireless channels. In: Proceedings of CHINACOM 2015, pp. 266–271 (2015). https://doi.org/10.1109/CHINACOM.2015.7497949

  18. Zheng, Y.R., Xiao, C.: Simulation models with correct statistical properties for Rayleigh fading channels. IEEE Trans. Commun. 51, 920–928 (2003). https://doi.org/10.1109/TCOMM.2003.813259

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by the National Natural Science Foundation of China under Grant 61372123. The work of Wu was also supported by the Scientific Research Foundation of Nanjing University of Posts and Telecommunications under Grant NY213002, and by the Key University Science Research Project of Jiangsu Province under Grant 14KJA510003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofu Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, X., Dai, D., Yu, X., Yan, J. (2019). Decorrelation of Wireless Channel Coefficients for Secret Key Generation. In: Hwang, S., Tan, S., Bien, F. (eds) Proceedings of the Sixth International Conference on Green and Human Information Technology. ICGHIT 2018. Lecture Notes in Electrical Engineering, vol 502. Springer, Singapore. https://doi.org/10.1007/978-981-13-0311-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0311-1_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0310-4

  • Online ISBN: 978-981-13-0311-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics