Secure Key Distribution based on Meteor Burst Communications

Amir Sulimov, Arkadij Karpov

2014

Abstract

The paper discusses possibility of secure encryption keys distribution based on stochastic properties of meteor burst radio propagation. Unlike wireless key distribution, this method provides much greater channel length and key distribution distances, which is up to 2000 km. Another important advantage is an ability of meteor burst communications to operate in severe climate, under conditions of polar and other remote areas. The paper also considers various physical factors ensuring stochastic variations in characteristics of received radio signal, which are applicable for the secret key generation. The simulation results revealing the most important randomizing factors within meteor burst channel are presented.

References

  1. Bennett, C., Brassard, G., 1984. Quantum Cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (Bangalore, India), pp. 175-179.
  2. Desourdis, R.J., Wojtaszek, H., Sidorov, V.V. et el., 1993. Nonreciprocity of Meteor Scatter Radio Links. In IES'93, Proceedings of Ionospheric Effects Symposium, pp. 165-173.
  3. Hershey, J.E., Hassan, A.A., Yarlagadda, R., 1995. Unconventional cryptographic keying variable management. In IEEE Transactions on Communications, vol.43., iss.1, pp.3-6.
  4. Karpov, A., Tereshin, S., Abrosimov, J., 2001. The computer model “KAMET”: The new generation version. In Proceedings of the Meteroids 2001 Conference (Kiruna, Sweden, 6-10 August 2001), pp.367-370.
  5. Karpov, A.V., Sidorov, V. V., 2005. Method for protecting information in meteor radio channel by encryption by random natural occurrence. Russian Federation Patent No. RU 2265957, published at 10.12.2005 in Bull. 34
  6. Khuzyashev, R.G., 1984. Calculation of the amplitude and phase characteristics of a signal scattered obliquely off a meteor trail. In Radiophysics and Quantum Electronics, vol. 27, iss.9, pp. 778-782.
  7. Korneyev, V.A., Epictetov, L.A., Sidorov, V. V., 2003. Time & Frequency coordination using unsteady, variable-precision measurements in meteor burst channel. In Proceedings of 17th European Frequency and Time Forum (Tampa, USA), 4-8 May.
  8. Korneyev, V.A., Sidorov, V.V., 2007. Optimization of concurrent data and high-precision time transfer modes in meteor burst synchronization equipment. In TimeNav'07, Proceedings of 21st European Frequency and Time Forum, pp. 923-926.
  9. Madiseh, M.G., McGuire, M. L., Neville, S. S., Cai L., 2008. Secret key generation and agreement in UWB communication channels. In GLOBECOM 2008, Proceedings of the IEEE Global Telecommunications Conference, pp.1-5.
  10. Madiseh, M.G., He, S., McGuire, M.L., Neville, S. W., Dong, X., 2009. Verification of secret key generation from UWB channel observations. In ICC'09, Proceedings of the IEEE International Conference on Communications, pp. 593-597.
  11. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A., 2008. Radio-Telepathy: extracting a secret key from an unauthenticated wireless channel. In MobiCom'08, Proceedings of the 14th ACM international conference on Mobile computing and networking, pp. 128-139.
  12. McKinley, D.W.R., 1961. Meteor science and engineering, McGraw-Hill, 309 p.
  13. Sidorov, V.V., Epictetov, L.A., 1993. Application of Meteor Burst Equipment for High Precision Comparisons of Time and Frequency Standards. In EFTF'93, Proceedings of 7th European Frequency and Time Forum, pp. 413-416.
  14. Sidorov, V.V., Karpov, A.V., Korneev, V.A., Nasyrov, A.F, 2007. Meteor Time Transfer and Meteor Cryptography. In TimeNav'07, Proceedings of 21st European Frequency and Time Forum, pp. 315-317.
  15. Weitzen, J.A., Sowa, M., Scofidio, R., Quinn, J., 1987. Characterizing the Multipath and Doppler Spreads of the High-Latitude Meteor Burst Communication Channel. In IEEE Trans. on Comm., vol.35, pp.1050- 1058.
Download


Paper Citation


in Harvard Style

Sulimov A. and Karpov A. (2014). Secure Key Distribution based on Meteor Burst Communications . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 445-450. DOI: 10.5220/0005113104450450


in Bibtex Style

@conference{secrypt14,
author={Amir Sulimov and Arkadij Karpov},
title={Secure Key Distribution based on Meteor Burst Communications},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={445-450},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005113104450450},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Secure Key Distribution based on Meteor Burst Communications
SN - 978-989-758-045-1
AU - Sulimov A.
AU - Karpov A.
PY - 2014
SP - 445
EP - 450
DO - 10.5220/0005113104450450