A Secure Key Sharing Algorithm Exploiting Phase Reciprocity in Wireless Channels

11/30/2021
by   Shayan Mohajer Hamidi, et al.
0

This article presents a secure key exchange algorithm that exploits reciprocity in wireless channels to share a secret key between two nodes A and B. Reciprocity implies that the channel phases in the links A→ B and B→ A are the same. A number of such reciprocal phase values are measured at nodes A and B, called shared phase values hereafter. Each shared phase value is used to mask points of a Phase Shift Keying (PSK) constellation. Masking is achieved by rotating each PSK constellation with a shared phase value. Rotation of constellation is equivalent to adding phases modulo-2π, and as the channel phase is uniformly distributed in [0,2π), the result of summation conveys zero information about summands. To enlarge the key size over a static or slow fading channel, the Radio Frequency (RF) propagation path is perturbed to create several independent realizations of multi-path fading, each used to share a new phase value. To eavesdrop a phase value shared in this manner, the Eavesdropper (Eve) will always face an under-determined system of linear equations which will not reveal any useful information about its actual solution value. This property is used to establish a secure key between two legitimate users.

READ FULL TEXT
research
10/19/2020

KaFHCa: Key-establishment via Frequency Hopping Collisions

The massive deployment of IoT devices being utilized by home automation,...
research
03/31/2022

Remote State Estimation of Multiple Systems over Semi-Markov Wireless Fading Channels

This work studies remote state estimation of multiple linear time-invari...
research
06/25/2019

Communication Through a Large Reflecting Surface With Phase Errors

Assume the communication between a source and a destination is supported...
research
10/25/2021

Random Matrix based Physical Layer Secret Key Generation in Static Channels

Physical layer secret key generation exploits the reciprocal channel ran...
research
02/06/2022

PhysFad: Physics-Based End-to-End Channel Modeling of RIS-Parametrized Environments with Adjustable Fading

Programmable radio environments parametrized by reconfigurable intellige...
research
03/26/2020

Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation

Wireless secret key generation (W-SKG) from shared randomness (e.g., fro...
research
05/07/2020

On Phase Offsets of 802.11ac Commodity WiFi

We analyze the phase offsets between RF chains of modern IEEE 802.11ac c...

Please sign up or login with your details

Forgot password? Click here to reset