Physical Layer Secret Key Generation with Kalman Filter Detrending

05/08/2023
by   Miroslav Mitev, et al.
0

The massive deployment of low-end wireless Internet of things (IoT) devices opens the challenge of finding de-centralized and lightweight alternatives for secret key distribution. A possible solution, coming from the physical layer, is the secret key generation (SKG) from channel state information (CSI) during the channel's coherence time. This work acknowledges the fact that the CSI consists of deterministic (predictable) and stochastic (unpredictable) components, loosely captured through the terms large-scale and small-scale fading, respectively. Hence, keys must be generated using only the random and unpredictable part. To detrend CSI measurements from deterministic components, a simple and lightweight approach based on Kalman filters is proposed and is evaluated using an implementation of the complete SKG protocol (including privacy amplification that is typically missing in many published works). In our study we use a massive multiple input multiple output (mMIMO) orthogonal frequency division multiplexing outdoor measured CSI dataset. The threat model assumes a passive eavesdropper in the vicinity (at 1 meter distance or less) from one of the legitimate nodes and the Kalman filter is parameterized to maximize the achievable key rate.

READ FULL TEXT

page 1

page 3

research
10/28/2021

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

This paper presents a systematic approach to use channel state informati...
research
09/19/2020

Sum Secret Key Rate Maximization for TDD Multi-User Massive MIMO Wireless Networks

Physical-layer key generation (PKG) based on channel reciprocity has rec...
research
05/16/2023

A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack

Physical layer security (PLS) is seen as the means to enhance physical l...
research
06/01/2022

Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

While the literature on RF fingerprinting-based authentication and key d...
research
10/19/2020

KaFHCa: Key-establishment via Frequency Hopping Collisions

The massive deployment of IoT devices being utilized by home automation,...
research
04/03/2023

Federated Kalman Filter for Secure IoT-based Device Monitoring Services

Device monitoring services have increased in popularity with the evoluti...
research
08/03/2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks

The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagat...

Please sign up or login with your details

Forgot password? Click here to reset