MIMO-Based Secret Key Generation Strategies

Author(s):  
Kan Chen ◽  
Bala Natarajan

Over the last decade, physical layer secret key generation (PHY-SKG) techniques that exploit reciprocity of wireless channels have attracted considerable interest among researchers in the field of wireless communication. Compared to traditional cryptographic methods, PHY-SKG techniques offer the following advantages: a computationally bounded adversary does not need to be assumed; PHY-SKG avoids the requirement of key management, and secret keys can be dynamically replenished. Additionally, PHY-SKG can enhance existing security schemes because it operates independently of higher layer security schemes. However, a key drawback of PHY-SKG is low secret key generation rate (SKGR), a critical performance metric. Therefore, the role of advanced network technologies (e.g., multiple input multiple output (MIMO) and cooperative MIMO) must be explored to enhance SKGR. This paper describes how MIMO and cooperative MIMO techniques can enhance SKGR.

Entropy ◽  
2020 ◽  
Vol 22 (6) ◽  
pp. 679 ◽  
Author(s):  
Pin-Hsun Lin ◽  
Carsten R. Janda ◽  
Eduard A. Jorswieck ◽  
Rafael F. Schaefer

In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie’s attention since it has a public discussion, which is observable by Willie. To prevent Willie’s attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.


Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 497 ◽  
Author(s):  
Guyue Li ◽  
Chen Sun ◽  
Junqing Zhang ◽  
Eduard Jorswieck ◽  
Bin Xiao ◽  
...  

The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.


2018 ◽  
Vol 7 (2.5) ◽  
pp. 23
Author(s):  
A H. Sulaiman ◽  
I F.T. Al-Shaikhli ◽  
M R. Wahiddin ◽  
S Houri ◽  
N Jamil ◽  
...  

One of the main problems with symmetric encryption is key distribution especially when involving large number of users i.e to generate identical keys at different locations. To address this challenge, we proposed a novel algorithm of secret key infusion protocol (SKIP) to generatean identical secret key. While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. The image from website must be a static image and used as the input of random bits to produce string of hexadecimal values. In a case where image link is compromised, the adversary has to guess other layers of parameters in starting pattern and string length. The generated secret keys were identical at two different locations. In other observation, different secret keys were generated even with the same image link and pattern length but different starting pattern.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 638
Author(s):  
Ashish Kumar Sarangi ◽  
Amrit Mukherjee ◽  
Amlan Datta

To achieve high capacity and high data rates is the main requirement for today’s generation. This paper studies about the performance and capacity comparison of MIMO and cooperative MIMO systems. The comparison of capacity between multiple- input- multiple- output (MIMO) and cooperative MIMO systems helps us to know that which system have better performance and better capacity. The simulation results shows that among SISO, SIMO, MISO and MIMO  system the capacity of MIMO will be better but in between MIMO and cooperative MIMO, Cooperative MIMO system have high capacity than MIMO systems.  


2021 ◽  
Vol 5 (3) ◽  
pp. 1-22
Author(s):  
Kai Li ◽  
Ning Lu ◽  
Jingjing Zheng ◽  
Pei Zhang ◽  
Wei Ni ◽  
...  

Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on Bluetooth Low Energy ( BLE ) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.


2018 ◽  
Vol 2018 ◽  
pp. 1-8
Author(s):  
Haiyang Yu ◽  
Wei Duan ◽  
Qiang Sun ◽  
Xia Wang ◽  
Jue Wang ◽  
...  

A generalized base station-relay-user equipment (BS-Relay-UE) beamforming design is investigated for a cooperative multiple-input multiple-output (MIMO) multirelay networks with imperfect channel state information (CSI). In order to minimize the worst-case mean square error (MSE) which is subject to a semi-infinite (SI) relay power constraints, a generalized optimal beamforming structure for the relay amplifying matrix is effectively proposed, and then the SI relay power constraints are converted into linear matrix inequalities (LMIs) version. In such conversion, the objective problem recasts as a decoupled biconvex semidefinite programming (SDP) one which can be efficiently solved by the proposed alternating algorithm. The system performance has been verified in terms of worst-case MSE using a set of qualitative analyses. The results show us that the proposed beamforming method outperforms the conventional schemes and can also effectively reduce the computational complexity when it is compared to the cutting-set schemes and also to the nonrobust ones.


Sign in / Sign up

Export Citation Format

Share Document