Physical layer characteristics of a wireless channel, which can be measured independently by the two communicating parties and yield near-identical results due to the channel reciprocity property, have been shown to be an important source of shared secrecy generation. Various types of channel state information (CSI), such as the received signal strength (RSS) and the channel impulse response (CIR) can be utilized for this purpose. Through periodic probing of the CSI, a continuous cycle of secret bit generation and key renewal can be maintained. However, many forms of wireless CSI inherently have substantial temporal correlation, which may hinder the secrecy generation process. Accordingly, various autocorrelation reduction (decorrelation) methods have been proposed, using either sub-sampling approaches that discard potentially valuable CSI data, or, computationally expensive transform domain approaches such as the Discrete Cosine Transform (DCT), Karhunen-Loeve Transform (KLT), and principal component analysis (PCA) that may not be feasible or desirable for resource and energy constrained devices. This paper proposes a low-complexity method for reducing the autocorrelation of the CSI measurements through a reordering of the data based on integer sequences such as the Fibonacci sequences, and applies it to various types of CSI data that represent both the individual path level CIR and the aggregate level multipath gain or RSS. We evaluate the performance of the method in three standard multipath ITU channel models. Fibonacci sequences are observed to be an effective means of decorrelating the channel measurement data, thereby eliminating the need for computationally intensive methods.
Declaration of competing interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
| [1] |
J. Zhang, G. Li, A. Marshall, A. Hu, L. Hanzo, A new frontier for IoT security emerging from three decades of key generation relying on wireless channels, IEEE Access 8 (2020) 138406-138446.
|
| [2] |
IEEE Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 2012, pp. 1-2793, IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007).
|
| [3] |
C. Lee, L. Zappaterra, K. Choi, H.-A. Choi, Securing smart home: Technologies, security challenges, and security requirements, in: Communications and Network Security (CNS), 2014 IEEE Conference on, 2014, pp. 67-72.
|
| [4] |
S. Aust, R.V. Prasad, I.G. Niemegeers, IEEE 802.11 ah: Advantages in standards and further challenges for sub 1 GHz Wi-Fi, in: Communications (ICC), 2012 IEEE International Conference on, IEEE, 2012, pp. 6885-6889.
|
| [5] |
S.N. Premnath, J.C. S. Jana, P.L. Gowda, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, Secret key extraction from wireless signal strength in real environments, IEEE Trans. Mob. Comput. 12 (5) (2013) 917-930.
|
| [6] |
L. Xiao, L. Greenstein, W. Mandayam, Using the physical layer for wireless authentication in time-variant channels, IEEE Trans. Wirel. Commun. 7 (7) (2008) 2571-2579.
|
| [7] |
J. Zhang, M. Firooz, N. Patwari, S. Kasera, Advancing wireless link signatures for location distinction, in: MobiCom 2008, ACM, 2008, pp. 26-37.
|
| [8] |
K. Zeng, Physical layer key generation in wireless networks: challenges and opportunities, Commun. Mag. IEEE 53 (6) (2015) 33-39.
|
| [9] |
W. Trappe, The challenges facing physical layer security, Commun. Mag. IEEE 53 (6) (2015) 16-20.
|
| [10] |
D. Kapetanovic, G. Zheng, F. Rusek, Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks, Commun. Mag. IEEE 53 (6) (2015) 21-27.
|
| [11] |
Z. Jiang, J. Zhao, X. Li, J. Han, W. Xi, Rejecting the attack: Source authentication for wi-fi management frames using csi information, in: Infocom 2013, IEEE, 2013, pp. 2544-2552.
|
| [12] |
H. Li, C. Shen, Y. Zhao, G. Sahin, H.-A. Choi, Y. Shah, High entropy secrecy generation from wireless CIR, J. Commun. Netw. 21 (2) (2019) 177-191.
|
| [13] |
C. Shen, H. Li, G. Sahin, H.-A. Choi, Y. Shah, Golay code based bit mismatch mitigation for wireless channel impulse response based secrecy generation, IEEE Access, 7 (2019) 2999-3007.
|
| [14] |
C. Shen, S. Feng, G. Sahin, H.-A. Choi, Symmetric key generation from imperfect shared phy-layer secrecy, in: 2019 IEEE Global Communications Conference, GLOBECOM, 2019, pp. 1-6.
|
| [15] |
N. Xie, J. Chen, L. Huang, Physical-layer authentication using multiple channel-based features, IEEE Trans. Inf. Forensics Secur. 16 (2021) 2356-2366.
|
| [16] |
G. Margelis, X. Fafoutis, G. Oikonomou, R. Piechocki, T. Tryfonas, P. Thomas, Physical layer secret-key generation with discreet cosine transform for the internet of things, in: 2017 IEEE International Conference on Communications, ICC, 2017, pp. 1-6.
|
| [17] |
N. Patwari, J. Croft, S. Jana, S.K. Kasera, High-rate uncorrelated bit extraction for shared secret key generation from channel measurements, IEEE Trans. Mob. Comput. 9 (1) (2010) 17-30.
|
| [18] |
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, N.B. Mandayam, Information-theoretically secret key generation for fading wireless channels, Inf. Forensics Secur. IEEE Trans. 5 (2) (2010) 240-254.
|
| [19] |
C. Ye, A. Reznik, Y. Shah, Extracting secrecy from jointly Gaussian random variables, in: Information Theory, 2006 IEEE International Symposium on, 2006, pp. 2593-2597.
|
| [20] |
C. Ye, A. Reznik, G. Sternberg, Y. Shah, On the secrecy capabilities of ITU channels, in: Vehicular Technology Conference, 2007. VTC-2007 Fall. 2007 IEEE 66th, 2007, pp. 2030-2034.
|
| [21] |
P. Huang, X. Wang, Fast secret key generation in static wireless networks: A virtual channel approach, in: 2013 Proceedings IEEE INFOCOM, 2013, pp. 2292-2300.
|
| [22] |
X. Zhu, F. Xu, E. Novak, C.C. Tan, Q. Li, G. Chen, Using wireless link dynamics to extract a secret key in vehicular scenarios, IEEE Trans. Mob. Comput. 16 (7) (2017) 2065-2078.
|
| [23] |
X. Zhu, F. Xu, E. Novak, C.C. Tan, Q. Li, G. Chen, Extracting secret key from wireless link dynamics in vehicular environments, in: 2013 Proceedings IEEE INFOCOM, 2013, pp. 2283-2291.
|
| [24] |
S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, On the effectiveness of secret key extraction from wireless signal strength in real environments, in: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MobiCom ’09, ACM, 2009, pp. 321-332.
|
| [25] |
S. Primak, K. Liu, X. Wang, Secret key generation using physical channels with imperfect CSI, in: 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 2014, pp. 1-5.
|
| [26] |
H. Liu, Y. Wang, J. Yang, Y. Chen, Fast and practical secret key extraction by exploiting channel response, in: 2013 Proceedings IEEE INFOCOM, 2013, pp. 3048-3056.
|
| [27] |
G. Li, A. Hu, J. Zhang, L. Peng, C. Sun, D. Cao, High-agreement uncorrelated secret key generation based on principal component analysis preprocessing, IEEE Trans. Commun. 66 (7) (2018) 3022-3034.
|
| [28] |
C.T. Zenger, M. Pietersz, J. Zimmer, J.-F. Posielek, T. Lenze, C. Paar, Authenticated key establishment for low-resource devices exploiting correlated random channels, Comput. Netw. 109 (7) (2016) 109-123.
|
| [29] |
S. Gopinath, R. Guillaume, P. Duplys, A. Czylwik, Reciprocity enhancement and decorrelation schemes for PHY-based key generation, in: 2014 IEEE Globecom Workshops, GC Wkshps, 2014, pp. 1367-1372.
|
| [30] |
S. Yasukawa, H. Iwai, H. Sasaoka, Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM, in:2008 International Symposium on Information Theory and Its Applications, 2008, pp. 1-6.
|
| [31] |
C. Chen, M.A. Jensen, Secret key establishment using temporally and spatially correlated wireless channel coefficients, IEEE Trans. Mob. Comput. 10 (2) (2011) 205-215.
|
| [32] |
G.D. Durgin, Space-Time Wireless Channels, Prentice Hall, 2002.
|
| [33] |
D. Halperin, W. Hu, A. Sheth, D. Wetherall, Tool release: gathering 802.11 n traces with channel state information, ACM SIGCOMM Comput. Commun. Rev. 41 (1) (2011) 53.
|
| [34] |
F. Gebhardt, Generating pseudo-random numbers by shuffling a Fibonacci sequence, Math. Comp. 21 (100) (2010) 708-709.
|
| [35] |
J.D. Parker, The period of the Fibonacci random number generator, Discrete Appl. Math. 20 (2) (1988) 145-164.
|
| [36] |
M.D. MacLaren, G. Marsaglia, Uniform random number generators, J. ACM 12 (1965) 83-89.
|
| [37] |
S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel,in:Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom ’08, ACM, New York, NY, USA, 2008, pp. 128-139.
|
| [38] |
X. Bian, Y. Rui, L. Lv, J. Li, R. Song, Unified multiple access structure based on FBMC modulation for multi-RAT coexistence in heterogeneous wireless networks, IET Commun. 14 (3) (2020) 440-450.
|
| [39] |
L. Heng, L.M. Jalloul, Performance of the 3GPP LTE space-frequency block codes in frequency-selective channels with imperfect channel estimation, IEEE Trans. Veh. Technol. 64 (5) (2015) 1848-1855.
|