TY - GEN
T1 - Improving robustness of key extraction from wireless channels with differential techniques
AU - Zan, Bin
AU - Gruteser, Marco
AU - Hu, Fei
PY - 2012
Y1 - 2012
N2 - Secure wireless communications typically rely on secret keys, which are difficult to establish in an ad hoc network without a key management infrastructure. Theoretically, the channel reciprocity and spatial decorrelation properties can be used to extract secret key, especially in a Rayleigh fading channel. However, as shown in some prior work by inserting or removing intermediate objects between the communication nodes, the strength of the secret key generated through such methods is low. Furthermore, the impact of small fluctuations also reduces the bit matching rate of such key agreement methods. In this paper, we propose a differential approach which uses the relative difference between two RSS values to determine the value of a secret bit. Additionally, the moving average method can be more easier and properly adapted to the differential approach which reduces the impact of small fluctuations. Experiment results and numerical evaluation show the proposed method has higher security strength, speed and matching rate comparing to a baseline from prior research work.
AB - Secure wireless communications typically rely on secret keys, which are difficult to establish in an ad hoc network without a key management infrastructure. Theoretically, the channel reciprocity and spatial decorrelation properties can be used to extract secret key, especially in a Rayleigh fading channel. However, as shown in some prior work by inserting or removing intermediate objects between the communication nodes, the strength of the secret key generated through such methods is low. Furthermore, the impact of small fluctuations also reduces the bit matching rate of such key agreement methods. In this paper, we propose a differential approach which uses the relative difference between two RSS values to determine the value of a secret bit. Additionally, the moving average method can be more easier and properly adapted to the differential approach which reduces the impact of small fluctuations. Experiment results and numerical evaluation show the proposed method has higher security strength, speed and matching rate comparing to a baseline from prior research work.
UR - http://www.scopus.com/inward/record.url?scp=84859910781&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84859910781&partnerID=8YFLogxK
U2 - 10.1109/ICCNC.2012.6167572
DO - 10.1109/ICCNC.2012.6167572
M3 - Conference contribution
AN - SCOPUS:84859910781
SN - 9781467300094
T3 - 2012 International Conference on Computing, Networking and Communications, ICNC'12
SP - 980
EP - 984
BT - 2012 International Conference on Computing, Networking and Communications, ICNC'12
T2 - 2012 International Conference on Computing, Networking and Communications, ICNC'12
Y2 - 30 January 2012 through 2 February 2012
ER -