To solve the dilemma that a high bit generation rate and a low probability of bit disagreement can't be achieved simultaneously in current physical layer key extraction schemes, a high-speed random key extraction scheme based on vector quantization (HRVQ) which just employs the RSS of Wi-Fi signal is proposed.First, the inconsistent RSS measurements between the two communication parties were reduced by inconsistency removal to achieve low bit disagreement rate.Then, the vector quantization was introduced to accelerate the extraction of bit streams from channel information and achieve high bit generation rate.Last, fuzzy extractor was employed to achieve adequate randomness and zero bit disagreement rate.The result of experiments indicates that our scheme outperforming the best scheme of the state-of-the-art can reach a 284% bit generation rate with a zero bit disagreement rate and a guaranteed randomness.
李鑫, 李兴华, 杨丹, 马建峰. 基于矢量量化的高效随机物理层密钥提取方案[J]. 电子学报, 2016, 44(2): 275-281.
LI Xin, LI Xing-hua, YANG Dan, MA Jian-feng. HRVQ:A High-Speed Random Key Extraction Scheme Based on Vector Quantization. Chinese Journal of Electronics, 2016, 44(2): 275-281.
[1] 孙宏,杨义先.无线局域网协议802.11安全性分析[J].电子学报,2003,31(7):1098-1100. Sun Hong,Yang Yixian.On the security of wireless network protocol 802.11[J].Acta Electronica Sinica,2003,31(7):1098-1100.(in Chinese)
[2] Sayeed A,Perrig A.Secure wireless communications:Secret keys through multipath[A].IEEE ICASSP[C].Piscataway,NJ,USA:IEEE Press,2008.3013-3016.
[3] Shannon C E.Communication theory of secrecy systems[J].J Bell Syst Tech,1949,28(4):656-715.
[4] Xiao L,Greenstein L,Mandayam N,et al.A physical-layer technique to enhance authentication for mobile terminals[A].IEEE International Conference on Communications[C].Piscataway,NJ,USA:IEEE,2008.1520-1524.
[5] Aono T,Higuchi K,Ohira T,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
[6] Hershey J,Hassan A,Yarlagadda R.Unconventional cryptographic keying variable management[J].IEEE Transactions on Communications,1995,43(1):3-6.
[7] Mathur S,Trappe W,Mandayam N,et al.Radio-telepathy:Extracting a secret key from an unauthenticated wireless channel[A].ACM MobiCom[C].New York,NY,USA:ACM Press,2008.128-139.
[8] Jana S,Pre S,Clark M,et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[A].ACM Mobi Com[C].New York,NY,USA:ACM,2009.321-332.
[9] Patwari N,Croft J,Jana S,et al.High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J].IEEE Transactions on Mobile Computing,2010,9(1):17-30.
[10] Croft J,Patwari N,Kasera S.Robust uncorrelated bit extraction methodologies for wireless sensors[A].ACM/IEEE ICNP[C].New York,NY,USA:ACM Press,2010.70-81.
[11] Zhang J,Firooz M H,Patwari N,et al.Advancing wireless link signatures for location distinction[A].ACM MobiCom[C].New York,NY,USA:ACM,2008.26-37.
[12] Azimi-Sadjadi B,Kiayias A,Mercado A,et al.Robust key generation from signal envelopes in wireless networks[A].ACM CCS[C].New York,NY,USA:ACM,2007.401-410.
[13] Tope M,Mceachen J.Unconditionally secure communications over fading channels[A].IEEE MILCOM[C].Piscataway,NJ,USA:IEEE,2001.54-58.
[14] Liu H,Yang J,Wang Y,et al.Collaborative secret key extraction leveraging received signal strength in mobile wireless networks[A].IEEE INFOCOM[C].Piscataway,NJ,USA:IEEE,2012.927-935.
[15] Liu H,Yang J,Wang Y,et al.Group secret key generation via received signal strength:Protocols,achievable rates,and implementation[J].IEEE Transactions on Mobile Computing,2014,13(12):2820-2835.
[16] Dou L,Wei Y,Ni J.Multi-user wireless channel probing for shared key generation with a fuzzy controller[J].Computer Networks,2014,58:112-126.
[17] Ye C,Reznik A,Shah Y.Extracting secrecy from jointly Gaussian random variables[A].IEEE ISIT[C].Piscataway,NJ,USA:IEEE,2006.2593-2597.
[18] Dodis Y,Ostrovsky R,Reyzin L,et al.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[J].SIAM Journal on Computing,2008,38(1):97-139.
[19] Dodis Y,Reyzin L,Smith A.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Heidelberg,GER:Springer,2004.523-540.
[20] Li X,Bao F,Li S,Ma J.FLAP:An efficient WLAN initial access authentication protocol[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(2):488-497.
[21] 李兴华,尚昭辉,杨丹,马建峰.利用无线物理层密钥增强802.11i的安全性[J].江苏大学学报(自然科学版),2013,34(4):416-421. Li Xinghua,Shang Zhaohui,Yang Dan,Ma Jianfeng.Security enhancement of 802.11i by wireless physical layer key[J].Journal of Jiangsu University(Natural Science Edition),2013,34(4):416-421.(in Chinese)