Figure 7 illustrates this effect in more details. It
presents the dependence of key disagreement rate
between the K
B
and K
E
as a function of the codeword
length m for three values of cross-correlation
coefficient between the {φ
B
} and {φ
E
} samples. The
presented curves demonstrate sharp decline in the
probability of key interception with increase in m at
low values of cross-correlation coefficient. This
result is in agreement with the conclusions of
fundamental work (Maurer, 1993), where it has been
shown, that not only the number of successfully
distributed bits N
+
should be considered for the key
generation rate R
K
estimation, but the amount of
mutual information I(K
E
;K
B
) between the K
B
and K
E
keys is also should be taken into account.
5 CONCLUSIONS
The experiments showed feasibility of wireless key
distribution based on measurements of carrier-phase
in a multipath environment. The key generation rate
R
K
~ 2 bps has been achieved at the Doppler
frequency f
D
~ 30Hz and cross-correlation between
the measurement samples of Alice and Bob close to
0.99. Investigation of spatial autocorrelation of the
signal phase showed an existence of the passive key
interception threat even at distances more than 3λ.
Furthermore, it was found that absolute correlation
between the measurement data of two closely spaced
nodes is hardly achievable in practice. The complex
effects of mutual influence of antennas and input
circuits of both nodes restrict the ability to intercept
generated keys. Experimental results have shown
that the behaviour of probability of passive key
interception when varying a spatial diversity of
legitimate user and eavesdropper basically repeats
the profile of the spatial autocorrelation function for
the measurement data. It was also shown an
existence of optimal number of bits, which should be
extracted from a single measurement of observable
random variable to maximize the key generation rate
and to reduce the probability of its interception.
REFERENCES
Bennet, C.H., Brassard, G., Crepeau, C., Maurer, U.M.,
1995. Generalized privacy amplification. In IEEE
Transactions on Information Theory, vol.41, iss.6, pp.
1915-1923.
Croft, J.E.D., 2011. Shared secret key establishment using
wireless channel measurements. Ph.D. thesis, Dept.
Elect. Eng., University of Utah, USA.
Hamida, S.T.B., Pierrot, J.B., Castelluccia, C., 2009. An
adaptive quantization algorithm for secret key
generation using radio channel measurements. In
NTMS’09, Proceedings of 3rd International
Conference on New Technologies, Mobility and
Security, pp. 1-5.
Hassan, A.A., Stark, W.E., Hershey, J.E., Chennakeshu,
S., 1996. Cryptographic key agreement for mobile
radio. In Digital Signal Processing, vol.6, iss.4, pp.
207-212.
Hershey, J.E., Hassan, A.A., Yarlagadda, R., 1995.
Unconventional cryptographic keying variable
management. In IEEE Transactions on
Communications, vol.43., iss.1, pp.3-6.
Korzhik, V., Yakovlev, V., Kovajkin, Y., 2012. Secret key
agreement over multipath channels exploiting a
variable-directional antenna. In International Journal
of Advanced Computer Science and Applications, vol.
13, No. 1, pp. 172–178.
Li, Z., Xu, W., Miller, R. and Trappe, W., 2006. Securing
wireless systems via lower layer enforcements. In
WiSec '06, Proceedings of the 5th ACM workshop on
Wireless Security, pp. 33-42.
Liu, R. and Trappe, W., 2010. Securing wireless
communications at the physical layer, Springer, NY,
396 p.
Madiseh, M.G., He, S., McGuire, M.L., Neville, S.W.,
Dong, X., 2009. Verification of secret key generation
from UWB channel observations, In ICC’09,
Proceedings of the IEEE International Conference on
Communications, pp. 593-597.
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik,
A., 2008. Radio-Telepathy: extracting a secret key
from an unauthenticated wireless channel. In
MobiCom’08, Proceedings of the 14th ACM
international conference on Mobile computing and
networking, pp. 128-139.
Maurer, Ueli M., 1993. Protocols for secret key agreement
by public discussion based on common information. In
Advances in Cryptology (CRYPTO ’92). Lecture Notes
in Computer Science, vol. 740, pp. 461–470.
Shehadeh, E.H., Alfandi, O., Tout, K., Hogrefe, D., 2011.
Intelligent mechanisms for key generation from
multipath wireless channels. In WTS’2011,
Proceedings of the Wireless Telecommunications
Symposium, pp.1-6.
Smolyakov, A.D., Sulimov, A.I., Karpov, A.V.,
Sherstyukov, O.N., 2013. Experimental Verification of
Possibility of Secret Encryption Keys Distribution
with a Phase Method In a Multipath Environment. In
SIBCON-2013, Proceedings of 2013 IEEE
International Siberian Conference on Control and
Communications.
Wei, Y., Zeng, K., Mohapatra, P., 2011. Adaptive wireless
channel probing for shared key generation based on
PID Controller. In Proceedings of IEEE
INFOCOM’2011, pp. 2165-2173.
Wilhelm, M., Martinovich, I., Schmitt, J.B., 2010. Secret
key from entangled sensor motes: implementation and
analysis. In WiSec’10, Proceedings of the 3rd ACM
ExperimentalStudyofPerformanceandSecurityConstraintsonWirelessKeyDistributionUsingRandomPhaseof
MultipathRadioSignal
415