Beruflich Dokumente
Kultur Dokumente
WIRELESS CHANNEL
Abhijit Ambekar, Nandish Kuruvatti*, and Hans D. Schotten
Chair for Wireless Communications and Navigation
University of Kaiserslautern, Germany.
email: {ambekar,schotten}@eit.uni-kl.de, *kuruvatt@rhrk.uni-kl.de
ABSTRACT
We propose an improved method of secret key generation us-
ing the variations in wireless channel. We construct recipro-
cal channel proles at a pair of transceivers and enhance it
using the
1
-norm minimization technique. Thereafter prelim-
inary keys are obtained that are synchronized by a localized
information reconciliation technique. The privacy of the syn-
chronized keys is enhanced by generating secure hashes. We
implement the proposed method on a testbed and validate its
performance to show decreased rates of bit disagreement of
preliminary keys, at an increased key generation rate.
1. INTRODUCTION
The broadcast nature of the wireless channel necessitates
the need for secrecy in wireless communication. The varia-
tions in the received signal are reciprocal only for a pair of
transceivers. However these variations are different for an
eavesdropper. This is due to the principle of channel reci-
procity [1]. Using these reciprocal variations, several key
generation methods have been proposed in the literature[2-6].
These methods in combination with existing computational
cryptographic methods can provide a more robust and secure
cryptographic infrastructure.
To construct good key generation schemes it is necessary
to record accurate channel measurements. To collect precise
channel measurements, a dedicated set of hardware and an-
tenna is necessary, since that alone can record accurate mea-
surements. The channel measurements recorded from general
purpose hardware e.g. wireless cards in laptops, would in no
way reect and match the precise measurements offered by
specialized hardware. However a dedicated hardware will in-
turn increase the cost and complexity of the system. Hence
a tradeoff between cost and complexity to increased perfor-
mance exists. We address this tradeoff and enhance the chan-
nel reciprocity without using any specialized hardware. As a
result of improved reciprocity we use a simple lossless binary
quantization method to generate the preliminary secret keys.
We synchronize the preliminary keys by using a localized in-
formation reconciliation technique.
The rest of the paper is organized as follows. In Section 2
we give a brief introduction to the method of key generation.
We propose our method of key generation and synchroniza-
tion in Section 3. In Section 4 we implement our proposed
method on a testbed and validate its performance. We con-
clude in Section 5 highlighting the main contributions of the
paper.
2. PRELIMINARY WORK
Consider Figure 1 where Alice and Bob want to transmit data
securely through a wireless channel. An adversary Eve taps
into the system and eavesdrops. Let the channel characteris-
tic measured by Bob be
. Let
and
)
when they are conducted during the coherence time of the
channel. Assuming that Eve is (/2) times away from both
Alice and Bob( is the wavelength of the wave being trans-
mitted) then, (
) and (
and
and
to be obtained
from the unknown vectors
and
such that:
, an initial approximation
vector
0
is obtained such that
0
=
Where
is
recovered from
0
by applying a
1
-norm minimization[9, 10]
on it such that
from
and