key mismatch rate p
e
= 28.3%. During the key
reconciliation each block of 23 key sequence bits in
length has been verified with the CRC-16 code.
After successful block verification we excluded 16
arbitrary bits from this block to prevent a key
leakage caused by the CRC-code transmission. The
achieved reconciliation efficiency was about η =
2.6%. Thus, collecting the multipath fluctuations
data for 300 seconds Alice and Bob were able to
extract 30-bit shared key sequence. Despite the
humble key generation rate achieved in practice, our
experiments prove a feasibility of the Wireless Key
Distribution based on the carrier phase fluctuations
in a mobile communications scenario.
6 CONCLUSIONS
Our experiments proved a feasibility of the Wireless
Key Distribution based on the carrier phase method
for the case of mobile communications within a real
urban environment. The key generation rate about
R
K
~ 0.1 bits per second (bps) has been achieved at
satisfactory statistical properties of the generated
key. Despite the humble key generation rates
achieved in practice, we believe in a great potential
of the method for the secure wireless key
distributing between the base station and mobile
subscriber in a cellular communications scenario.
However, a further improvement of synchronization
protocol for the legitimate users’ equipment is
required to achieve better system performance.
A key interception probability evaluation and its
spatial decorrelation problem should be addressed in
the following experiments.
REFERENCES
Bennett, C. H., Brassard, G., Crepeau, C., Maurer, U. M.,
1995. Generalized privacy amplification. In IEEE
Trans. on Inf. Theory, vol.41, iss.6, pp. 1915-1923.
Croft, J. E. D., 2011. Shared secret key establishment
using wireless channel measurements. Ph.D. thesis,
Dept. Elect. Eng., University of Utah, USA.
Hamida, S. T. B., Pierrot, J. B., Castelluccia, C., 2009. An
adaptive quantization algorithm for secret key
generation using radio channel measurements. In
NTMS’09, Proceedings of 3rd Int. Conf. on New
Technologies, Mobility and Security, pp. 1-5.
Hassan, A. A., Stark, W. E., Hershey, J. E., Chennakeshu,
S., 1996. Cryptographic key agreement for mobile
radio. In Digital Signal Processing, vol.6, iss.4, pp.
207-212.
Hershey, J. E., Hassan, A. A., Yarlagadda, R., 1995.
Unconventional cryptographic keying variable
management. In IEEE Transactions on
Communications, vol.43, iss.1, pp.3-6.
Madiseh, M. G., He, S., McGuire, M. L., Neville, S. W.,
Dong, X., 2009. Verification of secret key generation
from UWB channel observations, In Proceedings of
the IEEE ICC’09, pp. 593-597.
NIST, 2010. A Statistical Test Suite for Random and
Pseudorandom Number Generators for Cryptographic
Applications. NIST Special Publication 800-22.
Prettie, C., Cheung, D., Rusch, L., Ho, M., 2002. Spatial
correlation of UWB signal in a home environment. In
Proceedings of IEEE Conference on Ultra Wideband
Systems and Technologies, pp. 65-69.
Rappaport, T., 1996. Wireless communications: Principle
& Practice, IEEE Press, Prentice Hall, 641 p.
Rappaport, T. S., Sun, S., Mayzus, M. et al., 2013.
Millimeter Wave Mobile Communications for 5G
Cellular: It Will Work!. In IEEE Access, vol.1, pp.
335-349.
Smolyakov, A. D., Sulimov, A. I., Karpov, A. V.,
Sherstyukov, O.N., 2013. Experimental Verification of
Possibility of Secret Encryption Keys Distribution
with a Phase Method In a Multipath Environment. In
SIBCON-2013, Proc. of 2013 IEEE Int. Siberian Conf.
on Control and Communications.
Sulimov, A. I., Sherstyukov, O. N., Karpov, A. V.,
Smolyakov A.D., 2013. Simulation of Encryption Key
Distribution Process Based on a Multipath Radio
Propagation. In SIBCON-2013, Proc. of 2013 IEEE
Int. Siberian Conf. on Control and Communications.
Sulimov, A. I., Smolyakov, A. D., Karpov, A. V.,
Sherstyukov, O.N., 2014. Experimental Study of
Performance and Security Constraints on Wireless
Key Distribution Using Random Phase of Multipath
Radio Signal. In Proceedings of the 11th International
Conference on Security and Cryptography (SECRYPT-
2014), pp. 411-416.
Zhu, X., Xu, F., Novak, E. et al., 2013. Extracting secret
key from wireless link dynamics in vehicular
environments, In Proc. of IEEE INFOCOM 2013, pp.
2283-2291.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
360