Wireless Channel Estimation With Applications to Secret Key Generation

Wireless Channel Estimation With Applications to Secret Key Generation
Author: Alireza Movahedian
Publisher:
Total Pages:
Release: 2014
Genre:
ISBN:


Download Wireless Channel Estimation With Applications to Secret Key Generation Book in PDF, Epub and Kindle

This research investigates techniques for iterative channel estimation to maximize channel capacity and communication security. The contributions of this dissertation are as follows: i) An accurate, low-complexity approach to pilot-assisted fast-fading channel estimation for single-carrier modulation with a turbo equalizer and a decoder is proposed. The channel is estimated using a Kalman filter (KF) followed by a zero-phase filter (ZPF) as a smoother. The combination of the ZPF with the KF of the channel estimator makes it possible to reduce the estimation error to near the Wiener bound. ii) A new semi-blind channel estimation technique is introduced for multiple-input-multiple-output channels. Once the channel is estimated using a few pilots, a low-order KF is employed to progressively predict the channel gains for the upcoming blocks. iii) The capacity of radio channels is investigated when iterative channel estimation, data detection, and decoding are employed. By taking the uncertainty in decoded data bits into account, the channel Linear Minimum Mean Square Error (LMMSE) estimator of an iterative receiver with a given pilot ratio is obtained. The derived error value is then used to derive a bound on capacity. It is shown that in slow fading channels, iterative processing provides only a marginal advantage over non-iterative approach to channel estimation. Knowing the capacity gain from iterative processing versus purely pilot-based channel estimation helps a designer to compare the performance of an iterative receiver against a non-iterative one and select the best balance between performance and cost.iv) A Radio channel is characterized by random parameters which can be used to generate shared secret keys by the communicating parties when the channel is estimated. This research studies upper bounds on the rate of the secret keys extractable from iteratively estimated channels. Various realistic scenarios are considered where the transmission is half-duplex and/or the channel is sampled under the Nyquist rate.The effect of channel sampling interval, fading rate and noise on the key rate is demonstrated. The results of this research can be beneficial for the design and analysis of reliable and secure mobile wireless systems.

On Enhancements of Physical Layer Secret Key Generation and Its Application in Wireless Communication Systems

On Enhancements of Physical Layer Secret Key Generation and Its Application in Wireless Communication Systems
Author: Kang Liu
Publisher:
Total Pages: 186
Release: 2015
Genre:
ISBN:


Download On Enhancements of Physical Layer Secret Key Generation and Its Application in Wireless Communication Systems Book in PDF, Epub and Kindle

As an alternative and appealing approach to providing information security in wireless communication systems, secret key generation at physical layer has demonstrated its potential in terms of efficiency and reliability over traditional cryptographic methods. Without the necessity of a management centre for key distribution or reliance on computational complexity, physical layer key generation protocols enable two wireless entities to extract identical and dynamic keys from the randomness of the wireless channels associated with them. In this thesis, the reliability of secret key generation at the physical layer is examined in practical wireless channels with imperfect channel state information (CSI). Theoretical analyses are provided to relate key match rate with channel's signal-to-noise ratio (SNR), degrees of channel reciprocity, and iterations of information reconciliation. In order to increase key match rate of physical layer secret key generation, improved schemes in the steps of channel estimation and sample quantization are proposed respectively. In the channel estimation step, multiple observations of the wireless channels are integrated with a linear processor to provide a synthesized and more accurate estimation of the wireless channel. In the sample quantization step, a magnitude based quantization method with two thresholds is proposed to quantize partial samples, where specific quantization areas are selected to reduce cross-over errors. Significant improvements in key match rate are proven for both schemes in theoretical analysis and numerical simulations. Key match rate can even achieve 100% in both schemes with the assistance of information reconciliation process. In the end, a practical application of physical layer secret key generation is presented, where dynamic keys extracted from the wireless channels are utilized for securing secret data transmission and providing efficient access control.

The Generation of Shared Cryptographic Keys Through Channel Impulse Response Estimation at 60 GHz

The Generation of Shared Cryptographic Keys Through Channel Impulse Response Estimation at 60 GHz
Author:
Publisher:
Total Pages: 30
Release: 2010
Genre:
ISBN:


Download The Generation of Shared Cryptographic Keys Through Channel Impulse Response Estimation at 60 GHz Book in PDF, Epub and Kindle

Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

Physical Layer Secret Key Generation for Decentralized Wireless Networks

Physical Layer Secret Key Generation for Decentralized Wireless Networks
Author: Iulia Tunaru
Publisher:
Total Pages: 0
Release: 2015
Genre:
ISBN:


Download Physical Layer Secret Key Generation for Decentralized Wireless Networks Book in PDF, Epub and Kindle

Emerging decentralized wireless systems, such as sensor or ad-hoc networks, will demand an adequate level of security in order to protect the private and often sensitive information that they carry. The main security mechanism for confidentiality in such networks is symmetric cryptography, which requires the sharing of a symmetric key between the two legitimate parties. According to the principles of physical layer security, wireless devices within the communication range can exploit the wireless channel in order to protect their communications. Due to the theoretical reciprocity of wireless channels, the spatial decorrelation property (e.g., in rich scattering environments), as well as the fine temporal resolution of the Impulse Radio - Ultra Wideband (IR-UWB) technology, directly sampled received signals or estimated channel impulse responses (CIRs) can be used for symmetric secret key extraction under the information-theoretic source model. Firstly, we are interested in the impact of quantization and channel estimation algorithms on the reciprocity and on the random aspect of the generated keys. Secondly, we investigate alternative ways of limiting public exchanges needed for the reconciliation phase. Finally, we develop a new signal-based method that extends the point-to-point source model to cooperative contexts with several nodes intending to establish a group key.

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications
Author: Xiangyun Zhou
Publisher: CRC Press
Total Pages: 308
Release: 2016-04-19
Genre: Computers
ISBN: 1466567015


Download Physical Layer Security in Wireless Communications Book in PDF, Epub and Kindle

Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. Presenting high-level discussions along with specific examples, and illustrations, this is an ideal reference for anyone that needs to obtain a macro-level understanding of physical layer security and its role in future wireless communication systems.

Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems

Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems
Author: Britton T. Quist
Publisher:
Total Pages: 110
Release: 2013
Genre: Electronic dissertations
ISBN:


Download Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems Book in PDF, Epub and Kindle

Establishing secret keys from the commonly-observed randomness of reciprocal wireless propagation channels has recently received considerable attention. In this work we propose improved strategies for channel estimation between MIMO or beamforming systems for secret key generation. The amount of mutual information that can be extracted from the channel matrix estimates is determined by the quality of channel matrix estimates. By allocating increased energy to channel estimation for higher gain beamforming combinations at the expense of low-gain combinations, key establishment performance can be increased. Formalizing the notion of preferential energy allocation to the most efficient excitations is the central theme of this dissertation. For probing with beamforming systems, we formulate a theoretically optimal probing strategy that upper bounds the number of key bits that can be generated from reciprocal channel observations. Specifically, we demonstrate that the eigenvectors of the channel spatial covariance matrix should be used as beamformer weights during channel estimation and we optimize the energy allocated to channel estimation for each beamformer weight under a total energy constraint. The optimal probing strategy is not directly implementable in practice, and therefore we propose two different modifications to the optimal algorithm based on a Kronecker approximation to the spatial covariance matrix. Though these approximations are suboptimal, they each perform well relative to the upper bound. To explore how effective an array is at extracting all of the information available in the propagation environment connecting two nodes, we apply the optimal beamformer probing strategy to a vector current basis function expansion on the array volume. We prove that the resulting key rate is a key rate spatial bound that upper bounds the key rate achievable by any set of antenna arrays probing the channel with the same total energy constraint. For MIMO systems we assume the channel is separable with a Kronecker model, and then for that model we propose an improved probing strategy that iteratively optimizes the energy allocation for each node using concave maximization. The performance of this iterative approach is better than that achieved using the traditional probing strategy in many realistic probing scenarios.

Secret Key Establishment Using Wireless Channels as Common Randomness in Time-variant MIMO Systems

Secret Key Establishment Using Wireless Channels as Common Randomness in Time-variant MIMO Systems
Author: Chan Chen
Publisher:
Total Pages: 137
Release: 2010
Genre: Electronic dissertations
ISBN:


Download Secret Key Establishment Using Wireless Channels as Common Randomness in Time-variant MIMO Systems Book in PDF, Epub and Kindle

Encryption of confidential data with a secret key has become a widespread technique for securing wireless transmissions. However, existing key distribution methods that either deliver the secret key with a key distribution center or exchange the secret key using public-key cryptosystems are unable to establish perfect secret keys necessary for symmetric encryption techniques. This research considers secret key establishment, under the broad research area of information theoretic security, using the reciprocal wireless channel as common randomness for the extraction of perfect secret keys in multiple-input multiple-output (MIMO)communication systems. The presentation discusses the fundamental characteristics of the time-variant MIMO wireless channel and establishes a realistic channel simulation model useful for assessing key establishment algorithms. Computational examples show the accuracy and applicability of the model. The discussion then turns to an investigation of the influence of the spatial and temporal correlation of the channel coefficients on the bound of the key size generated from the common channel, and it is found that a sampling approach exists that can generate a key using the minimum sampling time. A practical key generation protocol is then developed based on an enhancement of a published channel coefficient quantization method that incorporates flexible quantization levels, public transmission of the correlation eigenvector matrix and low-density parity-check (LDPC) coding to improve key agreement. This investigation leads to the development of improved channel quantization techniques that dynamically shift the quantization boundaries at one node based on the information provided by the other node. Analysis based on a closed-form bound for the key error rate (KER) and simulations based on the channel model and measurement data show that the enhanced algorithms are able to dramatically reduce key mismatch and asymptotically approach the KER bound. Finally, other secret key generation algorithms based on channel-encryption rather than quantization are discussed, leading to a new concept for secret key generation using the common wireless channel.

Enabling Real-Time Wireless Channel Based Encryption Key Generation

Enabling Real-Time Wireless Channel Based Encryption Key Generation
Author: Brandon Z. Katz
Publisher:
Total Pages: 104
Release: 2016
Genre: Computer networks
ISBN:


Download Enabling Real-Time Wireless Channel Based Encryption Key Generation Book in PDF, Epub and Kindle

As the demand for wireless communication grows, so does the need for wireless security. Through both high profile attacks as well as personal identity theft at open access points, it has been demonstrated that security is falling behind the curve. Wireless consumers create weak passwords, forget to turn on the latest encryption, and connect to open wireless networks every day. One solution is to remove the human element and instead generate encryption keys on the fly. Recently, methods have been proposed to use wireless channels as common entropy sources to enable radios to generate symmetric encryption keys. These techniques rely on the unique wireless environment between two radios in order to effectively move security down to the physical layer of a radio network as opposed to requiring users to handle encryption keys directly. In this thesis, a method of generating keys using wireless channels in real-time through additions to the IEEE 802.11 protocol is described and validated. As part of the process, a technique for sampling wireless channels using application layer traffic is designed and tested. Additionally, major related points of interest such as channel coherence, bit error handling, and real-time processing, are discussed.