Information Theoretic Secret Key Agreement Based on Localization

Document Type : Original Article

Authors

1 Sharif University of Technology

2 Sharif university of technology

Abstract

Sharing secret key is an essential prerequisite of symmetric key cryptography and one way to share the key, is to agree on a secret key. In this research, we consider a source model for information theoretic secret key agreement based on the distance among the nodes. Secret key agreement based on information theory, unlike computational models, guarantees full information secrecy so that eavesdroppers receive no efficient information. The model is a basic system consisting of two legitimate users and an eavesdropper. The legitimate nodes try to agree on a reliable and secure key based on their (noisy) observation of the distance between them. The eavesdropper observes the distance, too. Since the distance between the nodes is under control of none of them, the model for secret key agreement is a source model. First, we model the distance estimation by the nodes to study the performance of the system (secret key capacity bounds). Error of distance estimation is modeled by a gaussian process with zero mean and a variance equal to the Cramer-Rao bound. Then we propose two methods to enhance system utility: artificial noise forwarding (ANF) and               multi-antenna transmission (transmission in different beam directions). In the first method artificial noise is used to worsen      eavesdropper's distance estimation and in the second method beacon signals are sent in different directions and the virtual         distances, that is equal to total distances the beacon signal has traveled, in different beam directions are used as the randomness sources. We show that if the eavesdropper is not equipped with a multi-directional antenna, then artificial noise forwarding is a useful method while in the case of users equipped with multi-directional antenna, artificial noise forwarding leaks more information to the eavesdropper and transmitting in different directions is a suitable way to increase the secret key rate, since the eavesdropper gains little information about virtual distances and most of the observations of the legitimate nodes and the eavesdropper are     independent.
 

Keywords


[1] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo, “Safeguarding 5g Wireless Communication Networks Using Physical Layer Security,” IEEE Communications Magazine, vol. 53, no. 4, pp. 20–27, 2015.##
[2] C. E. Shannon, “A Mathematical Theory of Communication, Part i, Part ii,” Bell Syst. Tech. J., vol. 27, pp. 623–656, 1948.##
[3] C. E. Shannon, “Communication Theory of Secrecy Systems,” Bell Labs Technical Journal, vol. 28, no. 4, pp. 656–715, 1949.##
[4] A. D. Wyner, “The Wire-tap Channel,” Bell Labs Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975.##
[5] I. Csiszár and J. Korner, “Broadcast Channels with Confidential Messages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, 1978.##
[6] W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theory, vol. 22, pp. 644–654, Nov. 1976.##
[7] A. Bidokhti, S. M. Pournaghei, and A. H. Khalili Tirandaz, “A Generalized Scheme for Extracting Biometric Keys from Keystroke Dynamics,” Journal of Electronical & Cyber Defence, vol. 5, no. 1, Serial no. 17, 2017. (In Persian)##
[8] R. Ahlswede and I. Csiszár, “Common Randomness in Information Theory and Cryptography. Part i: Secret Sharing,” IEEE Trans. Inf. Theory, vol. 39, pp. 1121–1132, Jul. 1993.##
[9] U. M. Maurer and S. Wolf, “Unconditionally Secure Key Agreement and the Intrinsic Conditional Information,” IEEE Trans. Inf. Theory, vol. 45, no. 2, pp. 499–514, 1999.##
[10] M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, “Wireless Information-Theoretic Security,” IEEE Trans. Inf. Theory, vol. 54, pp. 2515–2534, Jun. 2008.##
[11] R. Wilson, D. Tse, and R. A. Scholtz, “Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels,” IEEE Trans. Inf. Forens. Security, vol. 2, pp. 364–375, Sep. 2007.##
[12] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, “Radiotelepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel,” In Proc. 14th ACM Int. Conf. Mobile Computing and Networking (MobiCom’08), pp. 128–139, Sep. 2008.##
[13] S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, “On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments,” in ACM MobiCom, 2009.##
[14] T. Shimizu, H. Iwai, and H. Sasaoka, “Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems,” IEEE Trans. Inf. Forens. Security, vol. 6, pp. 650–660, Sep. 2011.##
[15] J. M. Rüeger, Electronic Distance Measurement: An Introduction. Springer Science & Business Media, 2012.##
[16] J. J. Caffery Jr, Wireless Location in CDMA Cellular Radio Systems, vol. 535. Springer Science & Business edia, 2006.##
[17] C. Neuberg, P. Papadimitratos, C. Fragouli, and R. Urbanke, “A Mobile World of Security- the Model,” in Information Sciences and Systems (CISS), 2011 45th Annual Conference on, pp. 1–6, IEEE, 2011.##
[18] O. Gungor, F. Chen, and C. E. Koksal, “Secret Key Generation via Localization and Mobility,” IEEE Trans. on Veh. Technol., vol. 64, pp. 2214–2230, Jun. 2015.##
[19] N. Kazempour, M.Mirmohseni, and MR.Aref. "New Techniques for Localization Based Information Theoretic Secret Key Agreement," In 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 70-76. IEEE, 2017.##
[20] S. Salimi and P. Papadimitratos, “Pairwise Secret Key Agreement Based on Location-Derived Common Randomness,” arXiv preprint arXiv:1512.08652, 2015.##
[21] C. R. Rao, Linear Statistical Inference and Its Applications. New York:Wiley, 2nd ed., 1973.##
 [22] Y. Qi and H. Kobayashi, “Cramer-Rao Lower Bound for Geolocation in Non-Line-of-Sight Environment,” in Proc. IEEE Conf. Acoustics, Speech, Signal Process., pp. 2473–2476, May 2002.##
[23] D. Bharadia, E. McMilin, and S. Katti, “Full Duplex Radios,” ACM SIGCOM.##
[24] S. Gezici, M. R. Gholami, S. Bayram, and M. Jansson, “Jamming of Wireless Localization Systems,” IEEE Trans. on Commun., vol. 64, pp. 2660–2676, Jun. 2016.##
[25] L. Gerdes, M. Riemensberger, and W. Utschick, “On the Equivalence of Degraded Gaussian MIMO Broadcast Channels,” Smart Antennas (WSA 2015); Proceedings of the 19th International ITG Workshop on, pp. 1–5, VDE, 2015.##