Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength
Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for cryptography, a major concern is to develop secure methods for distribution of the secret key. In securing the wireless fading channels by symmet...
Saved in:
| Published in: | 2019 53rd Annual Conference on Information Sciences and Systems (CISS) pp. 1 - 6 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.03.2019
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for cryptography, a major concern is to develop secure methods for distribution of the secret key. In securing the wireless fading channels by symmetric-key algorithms, the physical layer properties of the channel can be exploited for distribution of the secret keys. In this approach, the channel state provides a common randomness which is shared by the legitimate users but is mostly unknown to an eavesdropper. by means of signal processing techniques, this common randomness is extracted into random secret keys. This paper establishes an information theoretic upper bound on the rate at which the secret keys can be extracted. Instead of the conventional approach that relies on mathematical models for the wireless channel, this paper adopts an experimental approach to estimate this bound from empirical data. A set of signal processing techniques is developed here to numerically estimate this bound for a pair of received signal strength (RSS) recorded by indoor commercial radios. |
|---|---|
| AbstractList | Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for cryptography, a major concern is to develop secure methods for distribution of the secret key. In securing the wireless fading channels by symmetric-key algorithms, the physical layer properties of the channel can be exploited for distribution of the secret keys. In this approach, the channel state provides a common randomness which is shared by the legitimate users but is mostly unknown to an eavesdropper. by means of signal processing techniques, this common randomness is extracted into random secret keys. This paper establishes an information theoretic upper bound on the rate at which the secret keys can be extracted. Instead of the conventional approach that relies on mathematical models for the wireless channel, this paper adopts an experimental approach to estimate this bound from empirical data. A set of signal processing techniques is developed here to numerically estimate this bound for a pair of received signal strength (RSS) recorded by indoor commercial radios. |
| Author | Azizi, Sima Komaee, Arash |
| Author_xml | – sequence: 1 givenname: Sima surname: Azizi fullname: Azizi, Sima email: sima.azizi@siu.edu organization: Department of Electrical and Computer Engineering, Southern Illinois University, Carbondale, IL, 62901, USA – sequence: 2 givenname: Arash surname: Komaee fullname: Komaee, Arash email: akomaee@siu.edu@siu.edu organization: Department of Electrical and Computer Engineering, Southern Illinois University, Carbondale, IL, 62901, USA |
| BookMark | eNotj81KAzEURiPYha19AHGTF5gxdzI_maUdRi0UhKYLdyVNbtpAJymZKPr2DrSrw7c5fGdO7n3wSMgTsByAtS_dWsq8YNDmom45K8QdmUNTCACo4OuByH64uOi0OtNV-PZmpMHTdEK6VQlpsFSijpjoyqWR9r8pKp3QUBvDQLeo0f1MS7qjnwQyRfTHdHokM6vOIy5vXJDdW7_rPrLN5_u6e91kDpoqZbpsVVUWXJVQWWsaJg4GuQGOwpS20MZOdw2WrGaV4A1Tda10rfkBuAUQfEGer1qHiPtLdIOKf_tbJv8HAqBMDA |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CISS.2019.8693028 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 172811151X 9781728111513 |
| EndPage | 6 |
| ExternalDocumentID | 8693028 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i175t-c49a5423a415ffd708bde3d13e8d4f2cdf028de406058370a66ac6c3b13f1183 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000493551600081&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Thu Jun 29 18:38:06 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-c49a5423a415ffd708bde3d13e8d4f2cdf028de406058370a66ac6c3b13f1183 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_8693028 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-March |
| PublicationDateYYYYMMDD | 2019-03-01 |
| PublicationDate_xml | – month: 03 year: 2019 text: 2019-March |
| PublicationDecade | 2010 |
| PublicationTitle | 2019 53rd Annual Conference on Information Sciences and Systems (CISS) |
| PublicationTitleAbbrev | CISS |
| PublicationYear | 2019 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.6854011 |
| Snippet | Symmetric cryptography relies on pairs of identical secret keys shared by the legitimate communicating parties. To implement a symmetric-key algorithm for... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Communication system security Cryptography Fading channels Mutual information mutual information rate secret key Stochastic processes symmetric-key algorithm Transceivers Wireless communication wireless fading channel |
| Title | Empirical Bounds on the Rate of Secret Bits Extracted from Received Signal Strength |
| URI | https://ieeexplore.ieee.org/document/8693028 |
| WOSCitedRecordID | wos000493551600081&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09b8IwELUAdejUVlD1Wx46NiXGwXFWEKhdEGoY2JBjn2mGJghM1Z_fs4OoKnXpZkWWE93ZeS-5j0fIY2YFs2wg8CDpIkqYSiIJ6JC0MJwXXOOmskFsIp3N5HKZzVvk6VgLAwAh-Qye_TDE8k2t9_5XWV963b6BbJN2moqmVusQqGRx1h-_5rnP1ULnN_N-CaYEvJie_e9O56T3U3hH50dIuSAtqLokn3xsytDJg468CNKO1hVF3kbfkCfS2tLcUz9HR6Xb0cmXCw2YDfWFIxRZIeD7zNC8XOOWoT4IXa3de48sppPF-CU6aCFEJQK8i3SSqSFSH4WAa61JY1kY4IZxkCaxA20sPq4BhOd46PvZKCGUFpoXjFv8huCXpFPVFVwRygwUOgMdg04TJYZKMYHc1WTS4noQX5Out8dq03S7WB1McfP35Vty6k3eZGXdkY7b7uGenOhPV-62D8FF3-6JlTU |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFG8QTfSkBozf9uDRybru8wqBQERCHAdupGtfcQc3AsP45_vaEYyJF2_N0nTLe-1-v-19_Ah5THTINPNCPEgyc3wmfCcGdEiUKc4zLnFTaSs2EU0m8XyeTBvkaV8LAwA2-QyezdDG8lUpt-ZXWSc2un1efEAOA9_33LpaaxeqZG7S6Y3S1GRrofvrmb8kUyxiDE7_d68z0v4pvaPTPaickwYULZL2P1a57eVBu0YGaUPLgiJzo2_IFGmpaWrIX0W7ebWh_a_KtmBW1JSOUOSFgG80RdN8iZuGmjB0saze22Q26M96Q2enhuDkCPGVI_1EBEh-BEKu1ipy40wBV4xDrHztSaXxcRUgQLuB6WgjwlDIUPKMcY1fEfyCNIuygEtCmYJMJiBdkJEvwkAIFiJ7VUmscT1wr0jL2GOxqvtdLHamuP778gM5Hs5ex4vxaPJyQ06M-escrVvSrNZbuCNH8rPKN-t7665v34KYfA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2019+53rd+Annual+Conference+on+Information+Sciences+and+Systems+%28CISS%29&rft.atitle=Empirical+Bounds+on+the+Rate+of+Secret+Bits+Extracted+from+Received+Signal+Strength&rft.au=Azizi%2C+Sima&rft.au=Komaee%2C+Arash&rft.date=2019-03-01&rft.pub=IEEE&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FCISS.2019.8693028&rft.externalDocID=8693028 |