Title :
Secure wireless communications: Secret keys through multipath
Author :
Sayeed, Akbar ; Perrig, Adrian
Author_Institution :
Wisconsin Univ., Madison, WI
fDate :
March 31 2008-April 4 2008
Abstract :
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit scrambling at the application layer by exploiting a shared secret key between pairs of communicating nodes. However, more recent research argues that multipath propagation - a salient feature of wireless channels - provides a physical resource for secure communications. In this context, we propose a protocol that exploits the inherent randomness in multipath wireless channels for generating secret keys through channel estimation and quantization. Our approach is particularly attractive in wideband channels which exhibit a large number of statistically independent degrees of freedom (DoF), thereby enabling the generation of large, more-secure, keys. We show that the resulting keys are distinct for distinct pairwise links with a probability that increases exponentially with the key-size/channel DoF. We also characterize the probability that the two users sharing a common link generate the same key. This characterization is used to analyze the energy consumption in successful acquisition of a secret key by the two users. For a given key size, our results show that there is an optimum transmit power, and an optimum quantization strategy, that minimizes the energy consumption. The proposed approach to secret key generation through channel quantization also obviates the problem of key pre-distribution inherent to many existing cryptographic approaches.
Keywords :
channel estimation; cryptographic protocols; multipath channels; telecommunication security; wireless channels; channel estimation; channel quantization; cryptographic techniques; multipath wireless channel; optimum quantization strategy; secure wireless communication; security protocol; Channel estimation; Communication system security; Context; Cryptographic protocols; Cryptography; Energy consumption; Probability; Quantization; Wireless application protocol; Wireless communication; channel estimation; energy minimization; key pre-distribution; quantization; wideband transceivers;
Conference_Titel :
Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-1483-3
Electronic_ISBN :
1520-6149
DOI :
10.1109/ICASSP.2008.4518284