DocumentCode :
1465853
Title :
Keys Through ARQ: Theory and Practice
Author :
Abdallah, Yara ; Abdel Latif, Mohamed ; Youssef, Moustafa ; Sultan, Ahmed ; El Gamal, Hesham
Author_Institution :
Dept. of Electr. & Comput. Eng., Ohio State Univ., Columbus, OH, USA
Volume :
6
Issue :
3
fYear :
2011
Firstpage :
737
Lastpage :
751
Abstract :
This paper develops a novel framework for sharing secret keys using the Automatic Repeat reQuest (ARQ) protocol. We first characterize the underlying information theoretic limits, under different assumptions on the channel spatial and temporal correlation function. Our analysis reveals a novel role of “dumb antennas” in overcoming the negative impact of spatial correlation on the achievable secrecy rates. We further develop an adaptive rate allocation policy, which achieves higher secrecy rates in temporally correlated channels, and explicit constructions for ARQ secrecy coding that enjoy low implementation complexity. Building on this theoretical foundation, we propose a unified framework for ARQ-based secrecy in Wi-Fi networks. By exploiting the existing ARQ mechanism in the IEEE 802.11 standard, we develop security overlays that offer strong security guarantees at the expense of only minor modifications in the medium access layer. Our numerical results establish the achievability of nonzero secrecy rates even when the eavesdropper channel is less noisy, on the average, than the legitimate channel, while our Linux-based prototype demonstrates the efficiency of our ARQ overlays in mitigating all known, passive and active, Wi-Fi attacks at the expense of a minimal increase in the link setup time and a small loss in throughput.
Keywords :
IEEE standards; Linux; access protocols; automatic repeat request; channel allocation; computer network security; correlation methods; wireless LAN; ARQ mechanism; ARQ overlays; ARQ protocol; ARQ secrecy coding; ARQ-based secrecy; IEEE 802.11 standard; Linux-based prototype; Wi-Fi attacks; Wi-Fi networks; achievable secrecy rates; adaptive rate allocation policy; automatic repeat request protocol; channel spatial correlation function; dumb antennas; eavesdropper channel; explicit constructions; legitimate channel; link setup time; low implementation complexity; medium access layer; negative impact; nonzero secrecy rates; secret keys sharing; security guarantees; security overlays; temporal correlation function; temporally correlated channels; theoretical foundation; underlying information theoretic limits; Automatic repeat request; Correlation; Decoding; Encoding; IEEE 802.11 Standards; Protocols; Security; Automatic repeat request (ARQ) key sharing; IEEE 802.11 Security; intrusion detection; physical layer security;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2011.2123093
Filename :
5724298
Link To Document :
بازگشت