• DocumentCode
    6863
  • Title

    Secret Key Extraction from Wireless Signal Strength in Real Environments

  • Author

    Premnath, Sriram Nandha ; Jana, Suman ; Croft, Jessica ; Gowda, Prarthana Lakshmane ; Clark, Mike ; Kasera, Sneha Kumar ; Patwari, Neal ; Krishnamurthy, Srikanth V.

  • Author_Institution
    University of Utah, Salt Lake City
  • Volume
    12
  • Issue
    5
  • fYear
    2013
  • fDate
    May-13
  • Firstpage
    917
  • Lastpage
    930
  • Abstract
    We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. We use real world measurements of RSS in a variety of environments and settings. The results from our experiments with 802.11-based laptops show that 1) in certain environments, due to lack of variations in the wireless channel, the extracted bits have very low entropy making these bits unsuitable for a secret key, 2) an adversary can cause predictable key generation in these static environments, and 3) in dynamic scenarios where the two devices are mobile, and/or where there is a significant movement in the environment, high entropy bits are obtained fairly quickly. Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive lossy quantizer in conjunction with Cascade-based information reconciliation and privacy amplification. Our measurements show that our scheme, in comparison to the existing ones that we evaluate, performs the best in terms of generating high entropy bits at a high bit rate. The secret key bit streams generated by our scheme also pass the randomness tests of the NIST test suite that we conduct. We also build and evaluate the performance of secret key extraction using small, low-power, hand-held devices—Google Nexus One phones—that are equipped 802.11 wireless network cards. Last, we evaluate secret key extraction in a multiple input multiple output (MIMO)-like sensor network testbed that we create using multiple TelosB sensor nodes. We find that our MIMO-like sensor environment produces prohibitively high bit mismatch, which we address using an iterative distillation stage that we add to the key extraction process. Ultimately, we show that the secret key generation rate is increased when multiple sensors are involved- in the key extraction process.
  • Keywords
    Bit rate; Educational institutions; Entropy; Privacy; Quantization; Wireless communication; Wireless networks; cryptography; key generation; multipath fading; physical layer;
  • fLanguage
    English
  • Journal_Title
    Mobile Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1233
  • Type

    jour

  • DOI
    10.1109/TMC.2012.63
  • Filename
    6171198