On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret key generation (SKG). The ML-based approaches are completely unsupervised and hence avoid exhaustive measurement campaigns. We also propose using the Hilbert Schmidt independence criterion (HSIC); our simulation results demonstrate that the extracted stochastic part of the channel state information (CSI) vectors are statistically independent.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/01/2022

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

While the literature on RF fingerprinting-based authentication and key d...
research
05/08/2023

Physical Layer Secret Key Generation with Kalman Filter Detrending

The massive deployment of low-end wireless Internet of things (IoT) devi...
research
07/11/2023

Let's shake on it: Extracting secure shared keys from Wi-Fi CSI

A shared secret key is necessary for encrypted communications. Since Wi-...
research
07/05/2023

Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes

Physical layer approaches for generating secret encryption keys for wire...
research
01/10/2020

Wiretap channels with causal state information: revisited

The coding problem for wiretap channels with causal channel state inform...
research
10/19/2020

KaFHCa: Key-establishment via Frequency Hopping Collisions

The massive deployment of IoT devices being utilized by home automation,...
research
07/13/2019

BeSense: Leveraging WiFi Channel Data and Computational Intelligence for Behavior

The ever evolving informatics technology has gradually bounded human and...

Please sign up or login with your details

Forgot password? Click here to reset