Publication | Closed Access
On the effectiveness of secret key extraction from wireless signal strength in real environments
510
Citations
18
References
2009
Year
Unknown Venue
EngineeringInformation SecuritySecret Key ExtractionInformation ForensicsSide-channel AttackHardware SecurityWireless SecurityInformation Theoretic SecuritySecure CommunicationPrivacy-preserving CommunicationComputer EngineeringData PrivacyPrivate CommunicationComputer ScienceMobile ComputingCovert ChannelSignal ProcessingSignal StrengthData SecurityCryptographyWireless Signal StrengthReal Environments
The study evaluates the effectiveness of extracting secret keys from RSS variations for private communication between two wireless devices and proposes an environment‑adaptive key generation scheme. The authors use real‑world RSS measurements across diverse environments, applying an adaptive lossy quantizer combined with Cascade‑based information reconciliation and privacy amplification to generate keys. Experiments reveal that static environments produce low‑entropy, predictable keys, while dynamic settings yield high‑entropy keys quickly; the proposed adaptive scheme outperforms existing methods in entropy and bit rate and passes NIST randomness tests.
We evaluate the effectiveness of secret key extraction, for private communication between two wireless devices, from the received signal strength (RSS) variations on the wireless channel between the two devices. We use real world measurements of RSS in a variety of environments and settings. Our experimental results show that (i) in certain environments, due to lack of variations in the wireless channel, the extracted bits have very low entropy making these bits unsuitable for a secret key, (ii) an adversary can cause predictable key generation in these static environments, and (iii) in dynamic scenarios where the two devices are mobile, and/or where there is a significant movement in the environment, high entropy bits are obtained fairly quickly. Building on the strengths of existing secret key extraction approaches, we develop an environment adaptive secret key generation scheme that uses an adaptive lossy quantizer in conjunction with Cascade-based information reconciliation [7] and privacy amplification [14]. Our measurements show that our scheme, in comparison to the existing ones that we evaluate, performs the best in terms of generating high entropy bits at a high bit rate. The secret key bit streams generated by our scheme also pass the randomness tests of the NIST test suite [21] that we conduct.
| Year | Citations | |
|---|---|---|
Page 1
Page 1