Improving robustness of key extraction from wireless channels with differential techniques

Bin Zan, Marco Gruteser, Fei Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Abstract

Secure wireless communications typically rely on secret keys, which are difficult to establish in an ad hoc network without a key management infrastructure. Theoretically, the channel reciprocity and spatial decorrelation properties can be used to extract secret key, especially in a Rayleigh fading channel. However, as shown in some prior work by inserting or removing intermediate objects between the communication nodes, the strength of the secret key generated through such methods is low. Furthermore, the impact of small fluctuations also reduces the bit matching rate of such key agreement methods. In this paper, we propose a differential approach which uses the relative difference between two RSS values to determine the value of a secret bit. Additionally, the moving average method can be more easier and properly adapted to the differential approach which reduces the impact of small fluctuations. Experiment results and numerical evaluation show the proposed method has higher security strength, speed and matching rate comparing to a baseline from prior research work.

Original languageEnglish (US)
Title of host publication2012 International Conference on Computing, Networking and Communications, ICNC'12
Pages980-984
Number of pages5
DOIs
StatePublished - 2012
Event2012 International Conference on Computing, Networking and Communications, ICNC'12 - Maui, HI, United States
Duration: Jan 30 2012Feb 2 2012

Publication series

Name2012 International Conference on Computing, Networking and Communications, ICNC'12

Other

Other2012 International Conference on Computing, Networking and Communications, ICNC'12
Country/TerritoryUnited States
CityMaui, HI
Period1/30/122/2/12

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Improving robustness of key extraction from wireless channels with differential techniques'. Together they form a unique fingerprint.

Cite this