Summarizing our results, we can conclude that,
despite non-perfect reciprocity of meteor burst
channel, the Meteor Key Distribution is feasible in
practice. Physical parameters of each individual
meteor link essentially affect the performance of the
key distribution process making it unique for the
given radio link. Despite the humble key generation
rate, we believe that MKD systems could be useful
in practice. Their advantages are much greater key
distribution distances (up to 2000 km), low cost
equipment, vitality and ability to operate under
conditions of severe climate such as in polar and
other remote regions.
6 CONCLUSIONS
Our study presents the very first attempt to evaluate
a performance of Meteor Key Distribution systems
with an account of full complex of the physical layer
effects of meteor burst channel (MBC). To deal with
the channel non-reciprocity and diurnal variations
effects, we used a MBC simulation model with
improved electrodynamic and astronomical
calculations unit.
Our simulation results proved that, despite non-
perfect reciprocity of meteor burst channel, the
Meteor Key Distribution is feasible in practice.
Physical parameters of each individual meteor link
essentially affect the performance of the key
distribution process making it unique for the given
radio link. The main factor limiting key generation
rate is low meteor activity and its diurnal variation.
As show presented estimates, a shared key of 571
bits in length could be generated for a 24 hour
period at the Paris-Colmar meteor link with a peak
key generation rate about 59 bits per hour. Similar
estimates performed for the Vienna-Colmar meteor
link show 2081 bits as a daily key length with a peak
rate about 157 bits per hour, respectively.
Despite the humble key generation rates
presented, we believe that MKD systems could be
useful in practice. Specifically, they might be used
for key distribution at up to 2000 km distances in
such applications as AES, lightweight cryptography
like CLEFIA, and hash-based post-quantum
subkeys.
As we stated in the beginning, for the radio
channel to be applicable in key distribution
purposes, it must meet the three basic requirements:
1) randomness, 2) reciprocity and 3) spatial
selectivity. Hence, the spatial selectivity of meteor
burst channel must be addressed at the next stage of
justification of the Meteor Key Distribution systems.
REFERENCES
Bennett, C. H., Brassard, G., 1984. Quantum
Cryptography: Public key distribution and coin
tossing. In Proc. of IEEE Int. Conf. on Computers,
Systems and Signal Processing, pp. 175-179.
Bennett, C. H., Brassard, G., Crepeau, C., Maurer, U. M.,
1995. Generalized privacy amplification. In IEEE
Trans. on Inf. Theory, vol.41, iss.6, pp. 1915-1923.
Croft, J. E. D., 2011. Shared secret key establishment
using wireless channel measurements. Ph.D. thesis,
Dept. Elect. Eng., University of Utah, USA.
Desourdis, R. J., Wojtaszek, H., Sidorov, V. V. et al.,
1993. Nonreciprocity of Meteor Scatter Radio Links.
In IES’93, Proc. of Ionosph. Effects Symp., pp. 165-
173.
Hershey, J. E., Hassan, A. A., Yarlagadda, R., 1995.
Unconventional cryptographic keying variable
management. In IEEE Trans. on Communications, vol.
43., iss.1, pp.3-6.
Karpov, A., Tereshin, S., Abrosimov, J., 2001. The
computer model “KAMET”: The new generation
version. In Proc. of the Meteroids 2001 Conf., pp.367-
370.
Khuzyashev, R. G., 1984. Calculation of the amplitude
and phase characteristics of a signal scattered
obliquely off a meteor trail. In Radiophysics and
Quantum Electronics, vol.27, iss.9, pp.778-782.
Liu, H., Yang, J. et al., 2014. Group Secret Key
Generation via Received Signal Strength: Protocols,
Achievable Rates and Implementation. In IEEE Trans.
on Mobile Computing, vol.13, iss.12, pp.2820-2835.
McKinley, D. W. R., 1961. Meteor science and
engineering, McGraw-Hill, 309 p.
Sidorov, V. V., Karpov, A. V., Korneev, V. A., Nasyrov,
A.F., 2007. Meteor Time Transfer and Meteor
Cryptography. In TimeNav’07, Proc. of 21st European
Frequency and Time Forum, pp. 315-317.
Smolyakov, A. D., Sulimov, A. I., Karpov, A. V.,
Sherstyukov, O.N., 2013. Experimental Verification of
Possibility of Secret Encryption Keys Distribution
with a Phase Method In a Multipath Environment. In
SIBCON-2013, Proc. of 2013 IEEE Int. Siberian Conf.
on Control and Communications.
Sulimov, A.I., Karpov, A.V., 2014. Secure Key
Distribution based on Meteor Burst Communications.
In Proc. of the 11th Int. Conf. on Security and
Cryptography (SECRYPT-2014), pp. 445-450.
Sulimov, A. I., Smolyakov, A. D., Karpov, A. V.,
Sherstyukov, O.N., 2014. Experimental Study of
Performance and Security Constraints on Wireless
Key Distribution Using Random Phase of Multipath
Radio Signal. In Proc. of the 11th Int. Conf. on
Security and Cryptography (SECRYPT-2014), pp.
411-416.
Weitzen, J. A., Sowa, M., Scofidio, R., Quinn, J., 1987.
Characterizing the Multipath and Doppler Spreads of
the High-Latitude Meteor Burst Communication
Channel. In IEEE Trans. on Communications, vol.35,
pp.1050-1058.
PerformanceEvaluationofMeteorKeyDistribution
397