Information-theoretically Secret Key Generation for Fading Wireless Channels - Computer Science > Cryptography and SecurityReportar como inadecuado




Information-theoretically Secret Key Generation for Fading Wireless Channels - Computer Science > Cryptography and Security - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Abstract: The multipath-rich wireless environment associated with typical wirelessusage scenarios is characterized by a fading channel response that istime-varying, location-sensitive, and uniquely shared by a giventransmitter-receiver pair. The complexity associated with a richly scatteringenvironment implies that the short-term fading process is inherently hard topredict and best modeled stochastically, with rapid decorrelation properties inspace, time and frequency. In this paper, we demonstrate how the channel statebetween a wireless transmitter and receiver can be used as the basis forbuilding practical secret key generation protocols between two entities. Webegin by presenting a scheme based on level crossings of the fading process,which is well-suited for the Rayleigh and Rician fading models associated witha richly scattering environment. Our level crossing algorithm is simple, andincorporates a self-authenticating mechanism to prevent adversarialmanipulation of message exchanges during the protocol. Since the level crossingalgorithm is best suited for fading processes that exhibit symmetry in theirunderlying distribution, we present a second and more powerful approach that issuited for more general channel state distributions. This second approach ismotivated by observations from quantizing jointly Gaussian processes, butexploits empirical measurements to set quantization boundaries and a heuristiclog likelihood ratio estimate to achieve an improved secret key generationrate. We validate both proposed protocols through experimentations using acustomized 802.11a platform, and show for the typical WiFi channel thatreliable secret key establishment can be accomplished at rates on the order of10 bits-second.



Autor: Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan Mandayam

Fuente: https://arxiv.org/







Documentos relacionados