• DocumentCode
    3310033
  • Title

    Channel model and sounding method effects on wireless secret key rates

  • Author

    Walkenhorst, B.T. ; Harper, A.D. ; Baxley, Robert J.

  • Author_Institution
    Georgia Tech Res. Inst., Georgia Inst. of Technol., Atlanta, GA, USA
  • fYear
    2012
  • fDate
    13-15 Nov. 2012
  • Firstpage
    597
  • Lastpage
    602
  • Abstract
    Ensuring data privacy of wireless communication systems has been a challenging problem for various reasons. The simplicity of eavesdropping on wireless transmissions makes the barrier to entry lower for wireless than for wired systems. Due to size and power constraints, wireless systems are sometimes unable to implement the complex cryptographic algorithms that can ensure the privacy of their data, leaving them with weaker schemes that are more easily exploited. However, the wireless security problem has one distinct advantage over the wired problem in that the channel seen by the eavesdropper is not usually correlated with the channel seen by the intended receiver. Recent research in the community has suggested that the randomness inherent in the wireless channel may be exploited to create secret keys dynamically, making simple wireless cryptographic schemes extremely strong and in some applications providing perfect secrecy. In this paper, we present some information theory bounds on key lengths for various wireless channel models and discuss the impact such physical channel-derived dynamic re-keying would have on various applications. We also present some thoughts on proving out the concepts in actual systems.
  • Keywords
    cryptography; data privacy; telecommunication security; wireless channels; cryptographic algorithms; data privacy; information theory bounds; intended receiver; physical channel-derived dynamic rekeying; power constraints; sounding method effects; wired systems; wireless channel models; wireless communication systems; wireless cryptographic schemes; wireless secret key rates; wireless security problem; wireless transmissions; Channel estimation; Channel models; Communication system security; Correlation; Delay; Doppler effect; Wireless communication; cryptography; secrecy capacity; wireless secrecy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Homeland Security (HST), 2012 IEEE Conference on Technologies for
  • Conference_Location
    Waltham, MA
  • Print_ISBN
    978-1-4673-2708-4
  • Type

    conf

  • DOI
    10.1109/THS.2012.6459916
  • Filename
    6459916