Abstract:The existing physical layer secret key generation scheme is not sufficiently secure when the eavesdropper keeps close to the legitimate user to get the correlated channel characteristics.To solve the problem,this paper analyzes the secret key bit error rate and proposes a physical layer secret key generation scheme based on signal propagation characteristics.We calculate the large scale fading model which parameters is fitted by the measured sample,in order to get the small scale parameter of received signal strength indication under the effect of multipath fading to quantify into binary secret bit.The experimental results show that compared with the traditional scheme, in the indoor environment,after eavesdropping distance is greater than 0.6 wavelength,the eavesdropper key bit error rate is greater than 0.48.And in the outdoor environment,after the eavesdropping distance is greater than 1 wavelength,the eavesdropper key bit error rate is 0.47. Secure and reliable physical layer secret key generation is achieved.
[1] 孙宏,杨义先.无线局域网协议802.11安全性分析[J].电子学报,2003,31(7):1098-1100. SUN Hong,YANG Yi-xian.On the security of wireless network protocol 802.11[J].Acta Electronica Sinica,2003,31(7):1098-1100.(in Chinese)
[2] Hershey J E,Hassan AA,Yarlagadda R.Unconventional cryptographic keying variable management[J].IEEE Transactions on Communications,1995,43(1):3-6.
[3] Patwari N,Croft J,Jana S,et al.High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J].IEEE Transactions on Mobile Computing,2010,9(1):17-30.
[4] 李鑫,李兴华,杨丹,马建峰.基于矢量量化的高效随机物理层密钥提取方案[J].电子学报,2016,44(2):275-281. LI Xin,LI Xing-hua,YANG Dan,MA Jian-feng.A high-speed random key extraction scheme based on vector quantization[J].Acta Electronica Sinica,2016,44(2):275-281.(in Chinese)
[5] Aono T,Higuchi K,Ohira T,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and propagation,2005,53(11):3776-3784.
[6] Premnath S N,Jana S,Croft J,et al.Secret key extraction from wireless signal strength in real environments[J].IEEE Transactions on mobile Computing,2013,12(5):917-930.
[7] Ye C,Mathur S,Reznik A,et al.Information theoretically secret key generation for fading wireless channels[J].IEEE Transactions on Information Forensics and Security,2010,5(2):240-254.
[8] Zhu X,Xu F,Novak E,et al.Using wireless link dynamics to extract a secret key in vehicular scenarios[J].IEEE Transactions on Mobile Computing,2017,16(7):2065-2078.
[9] Mathur S,Trappe W,Mandayam N,et al.Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[A].14th ACM international conference on Mobile computing and networking[C].San Francisco,California,USA,2008.128-139.
[10] Edman M,Kiayias A,Tang Q,et al.On the security of key extraction from measuring physical quantities[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1796-1806.
[11] Chen C,Jensen M A.Secret key establishment using temporally and spatially correlated wireless channel coefficients[J].IEEE Transactions on Mobile Computing,2011,10(2):205-215.
[12] Erceg V,Greenstein L J,Tjandra S Y,et al.An empirically based path loss model for wireless channels in suburban environments[J].IEEE Journal on selected areas in communications,1999,17(7):1205-1211.
[13] Ye C,Reznik A,Shah Y.Extracting secrecy from jointly Gaussian random variables[A].IEEE International Symposium on Information Theory[C].IEEE,2006.2593-2597.
[14] Margelis G,Fafoutis X,Oikonomou G,et al.Physical layer secret-key generation with discreet cosine transform for the Internet of Things[A].2017 IEEE International Conference on Communications[C].IEEE,2017.1-6.