Computer Science ›› 2017, Vol. 44 ›› Issue (Z11): 362-365.doi: 10.11896/j.issn.1002-137X.2017.11A.076

Previous Articles     Next Articles

Group Secret Key Generation and Analysis in Wireless Network Based on Pairwise-generating Strategies

DAI Dong-ming and WU Xiao-fu   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Secret key establishment within wireless terminals utilizing physical layer information of wireless channel to ensure the security of mobile environment has received wide attention.However,generating group secret key among multiple wireless devices for secure communication in reality environment remains a challenge.This paper proposed a group secret key establishment scheme based on central node pairwise-generating strategies under the star topology in wireless network.Compared with the existing group secret key extraction method using the difference of received signal strength(RSS) among the wireless devices in the group,we gave a explicit analysis and a specific numerical result on the achieva-ble group secret key rate of each one.It shows that our scheme outperforms that of generating group key by leveraging the difference of RSS on key rate.

Key words: Collaborative secret key extraction,Receiving signal strength,Group secret key generation,Pairwise-generating strategies

[1] AZIMI-SADJADI B,KIAYIAS A,MERCADO A,et al.Robust key generation from signal envelopes in wireless networks[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:401-410.
[2] ZHANG J,DUONG T Q,MARSHALL A,et al.Key Generation From Wireless Channels:A Review[J].IEEE Access,2016,4:614-626.
[3] JANA S,PREMNATH S N,CLARK M,et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[C]∥Proceedings of the 15th Annual International Conference on Mobile Computing and Networking.ACM,2009:321-332.
[4] MATHUR S,TRAPPE W,MANDAYAM N,et al.Radio-tele-pathy:extracting a secret key from an unauhenticated wireless channel[C]∥Proceedings of the 14th ACM International Conference on Mobile Computing and Networking.ACM,2008:128-139.
[5] SAYEED A,PERRING A.Secure wireless communications:Secret keys through multipath[C]∥2008 IEEE International Conference on Acoustics,Speech and Signal Processing.IEEE,2008:3013-3016.
[6] WANG Q,SU H,REN K,et al.Fast and scalable secret key generation exploiting channel phase randomness in wireless networks[C]∥INFOCOM,2011 Proceedings IEEE.IEEE,2011:1422-1430.
[7] NITINAWARAT S,YE C,BARG A,et al.Secret key generation for a pairwise independent network model[J].IEEE Transac-tions on Information Theory,2010,56(12):6482-6489.
[8] YE C,REZNIK A.Group secret key generation algorithms[C]∥2007 IEEE International Symposium on Information Theory.IEEE,2007:2596-2600.
[9] KIM Y,PERRING A,TSUDIK G.Tree-based group key agreement[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):60-96.
[10] LIU H,WANG Y,CHEN Y,et al.Group Secret Key Generation via Received Signal Strength:Protocols,Achievable Rates,and Implementation[J].IEEE Transactions on Mobile Computing,2014,13(12):2820-2835.
[11] LAI L,HO S W.Key generation algorithms for pairwise independent networks based on graphical models[J].IEEE Transactions on Information Theory,2015,61(9):4828-4837.
[12] XU P,CUMANAN K,DING Z,et al.Group Secret Key Generation in Wireless Networks:Algorithms and Rate Optimization[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1831-1846.
[13] THAI C D T,LEE J,QUEK T Q S.Secret group key generation in physical layer for mesh topology[C]∥2015 IEEE Global Communications Conference (GLOBECOM).IEEE,2015:1-6.
[14] WEI Y,ZHU C,NI J.Group Secret Key Generation Algorithm from Wireless Signal Strength[C]∥Sixth International Conferen-ce on Internet Computing for Science and Engineering.IEEE Computer Society,2012:239-245.
[15] LAI L,HO S W.Simultaneously generating multiple keys and multi-commodity flow in networks[C]∥Information Theory Workshop.IEEE,2012:627-631.
[16] CSISZAR I,NARAYAN P.Secrecy capacities for multiple terminals[J].IEEE Transactions on Information Theory,2004,50(12):3047-3061.
[17] TSE D,VISWANATH P.Fundamentals of wireless communication[M].Cambridge university press,2005.
[18] GOLDSMITH A.Wireless communications[M].Cambridge university press,2005.
[19] SHANNON C E.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715.
[20] YE C,REZNIK A,SHAH Y.Extracting Secrecy from JointlyGaussian Random Variables[C]∥IEEE International Symposiumon Information Theory.IEEE,2006:2593-2597.
[21] WILSON R,TSE D,SCHOLTZ R A.Channel Identification:Secret Sharing using Reciprocity in Ultrawideband Channels[C]∥IEEE International Conference on Ultra-Wideband.IEEE,2007:270-275.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!