Advertisement

Experimental Results on Secret-Key Extraction from Unsynchronized UWB Channel Observations

  • Gianni PasoliniEmail author
  • Enrico Paolini
  • Davide Dardari
  • Marco Chiani
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 358)

Abstract

Wireless channel reciprocity can be exploited by two users willing to achieve confidential communications over a public channel as a common source of randomness for the generation of a secret key. In this chapter, the important issue of signal synchronization between the two users is discussed and a simple and practical solution is proposed to overcome this problem. The proposed scheme is tested with a real measurements campaign aimed at extracting secret-keys from the physical parameters of ultrawide bandwidth channels in an indoor scenario. The proposed solution is proved to be effective, as shown in the numerical results that provide an insight on the rate of agreement between the keys separately generated by the two users.

Keywords

Legitimate User Public Channel Secrecy Capacity Linear Block Code Perfect Secrecy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

We wish to thank Nicoló Decarli for setting up the experimental testbed.

References

  1. 1.
    Ahlswede R, Csiszar I (1993) Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans Inf Theory 39(4):1121–1132zbMATHMathSciNetCrossRefGoogle Scholar
  2. 2.
    Bernstein DJ, Buchmann J (2009) Post-quantum cryptography. Springer, BerlinzbMATHCrossRefGoogle Scholar
  3. 3.
    Bloch M, Barros J (2011) Physical-layer security. Information theory to security engineering. Cambridge University Press, CambridgeGoogle Scholar
  4. 4.
    Dardari D, Conti A, Ferner U, Giorgetti A, Win M (2009) Ranging with ultrawide bandwidth signals in multipath environments. In: Proceedings of the IEEE 97(2):404–426Google Scholar
  5. 5.
    Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans. Inf. Theory 22(6):644–654zbMATHMathSciNetCrossRefGoogle Scholar
  6. 6.
    El Gamal A, Kim YH (2011) Network information theory. Cambridge University Press, CambridgeGoogle Scholar
  7. 7.
    El Hajj Shehadeh Y, Alfandi O, Hogrefe D (2012) Towards robust key extraction from multipath wireless channels. J Commun NetwGoogle Scholar
  8. 8.
    Hershey J, Hassan A, Yarlagadda R (1995) Unconventional cryptographic keying variable management. IEEE Trans Commun 43(1):3–6zbMATHCrossRefGoogle Scholar
  9. 9.
    Iera A, Floerkemeier C, Mitsugi J, Morabito G (2010) The internet of things (guest editorial). IEEE Wirel Commun 17(6):8–9CrossRefGoogle Scholar
  10. 10.
    Li J, Petropulu A (2011) On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Trans Wirel Commun 10(4):1176–1187CrossRefGoogle Scholar
  11. 11.
    Liang Y, Poor HV, Shamai (Shitz) S (2008) Information theoretic security. Found Trends Commun Inf Theory 5(4–5):355–580. http://dx.doi.org/10.1561/0100000036 Google Scholar
  12. 12.
    Madiseh M, McGuire M, Neville S, Shirazi A (2008) Secret key extraction in ultra wideband channels for unsynchronized radios. In: Proceedings of the 6th annual communication networks and services research conference (CNSR) 2008, pp 88–95Google Scholar
  13. 13.
    Madiseh M, He S, McGuire M, Neville S, Dong X (2009) Verification of secret key generation from UWB channel observations. In: IEEE international conference on communications (ICC) 2009, pp 1–5Google Scholar
  14. 14.
    Madiseh M, Neville S, McGuire M (2010) Time correlation analysis of secret key generation via UWB channels. In: IEEE global telecommunications conference (GLOBECOM) 2010, pp 1–6Google Scholar
  15. 15.
    Marino F, Paolini E, Chiani M (2014) Secret key extraction from a UWB channel: analysis in a real environment. In: IEEE international conference on ultra-wideband (ICUWB) 2014, pp 80–85Google Scholar
  16. 16.
    Maurer U (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742zbMATHCrossRefGoogle Scholar
  17. 17.
    Pasolini G, Dardari D (2015) Secret information of wireless multi-dimensional gaussian channels. IEEE Trans Wirel Commun 14(6):3429–3442Google Scholar
  18. 18.
    Patwari N, Croft J, Jana S, Kasera S (2010) High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans Mobile Comput 9(1):17–30CrossRefGoogle Scholar
  19. 19.
    Prettie C, Cheung D, Rusch L, Ho M (2002) Spatial correlation of UWB signals in a home environment. In: IEEE conference on ultra wideband systems and technologies, 2002. Digest of Papers, pp 65–69Google Scholar
  20. 20.
    Rabbachin A, Conti A, Win M (2015) Wireless network intrinsic secrecy. IEEE/ACM Trans Netw 23(1):56–69CrossRefGoogle Scholar
  21. 21.
    Ren K, Su H, Wang Q (2011) Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel Commun 18(4):6–12CrossRefGoogle Scholar
  22. 22.
    Severi S, Abreu G, Pasolini G, Dardari D (2014) A secret key exchange scheme for near field communication. In: IEEE wireless communications and networking conference (WCNC) 2014, pp 428–433Google Scholar
  23. 23.
    Time Domain Corporation (2008) System analysis module user’s manual—PulsON 220TM UWB RadioGoogle Scholar
  24. 24.
    Weber RH (2010) Internet of things new security and privacy challenges. Comput Law Secur Rev 26(1):23–30CrossRefGoogle Scholar
  25. 25.
    Wilson R, Tse D, Scholtz R (2007) Channel identification: secret sharing using reciprocity in ultrawideband channels. In: IEEE international conference on ultra-wideband (ICUWB) 2007, pp 270–275Google Scholar
  26. 26.
    Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1334–1387. http://ci.nii.ac.jp/naid/80013288768/en/ Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Gianni Pasolini
    • 1
    Email author
  • Enrico Paolini
    • 1
  • Davide Dardari
    • 1
  • Marco Chiani
    • 1
  1. 1.Department of Electrical, Electronic, and Information Engineering“G. Marconi” University of BolognaBolognaItaly

Personalised recommendations