Algorithm for synchronous generation of key information based on the characteristics of the communication channel between mobile radio devices
Аuthors
*, **, ***National Research University of Electronic Technology, 1, sq. Shokina, Moscow, Zelenograd, 124498, Russia
*e-mail: bah@miee.ru
**e-mail: vv.dymnikov@gmail.com
***e-mail: 79999924816@ya.ru
Abstract
Today, cryptographic protocols based on symmetric and asymmetric encryption algorithms are usually used to protect information in a radio network. Such security methods are associated with the need to implement a key management and distribution system.
This paper discusses an alternative approach to key information distribution for symmetric cryptographic algorithms, currently under study, available to mobile radio facilities sharing a radio channel. The paper presents the operating principle of the algorithm for synchronous and symmetric generation of key information based on the state of the radio channel between radio facilities, as well as a specific implementation of the algorithm and the results of its field tests. The algorithm presented in the paper differs from those presented in the literature in that it has a better entropy of the resulting sequence for generating key information.
In this paper, we will consider a method for synchronous generation of key information based on the use of the time dynamics of the average received signal strength (RSSI). The choice is justified by the fact that this is a universal characteristic supported by most receivers. To measure it, two transceivers operating in a half-duplex mode with time division are sufficient, and the presence of a system with multiple antennas is not necessary.
The considered algorithm allows synchronous formation of a sequence on a pair of nodes connected by a radio communication channel, which depends on the characteristics of the radio channel - in this case, the average energy level of the received radio signal. The algorithm has good entropy indicators of the sequence being formed. The conducted full-scale tests show that the entropy of the sequence formed by the algorithm is practically independent of the type of radio path, however, radio paths with a low level of Rayleigh fading lead to a longer operation of the algorithm to form a sequence of identical length.
The conducted full-scale tests show the fundamental possibility of using algorithms of this type for the formation and simultaneous distribution of key information between land mobile radio communication facilities operating in the UHF and SHF wavelength ranges. In turn, with the increase in the frequency of use of wireless communication channels, as well as the increase in the value of information circulating in such channels and the technical capabilities of intruders, the relevance of searching for and studying new approaches to solving the classical problem of distributing key information is constantly increasing.
Keywords:
random sequences, Rayleigh multipath channel, small-scale fadingReferences
- Preobrazhenskii N.B., FaĬzulkhakov YA.R. The problem of compensation of Rayleigh fading in radio channels of mobile voice communication systems. Informatika i ee primenenie. 2011. V. 5, No. 2, P. 82-89. (In Russ.)
- Aono T., Higuchi K., Ohira T., Komiyama B., Sasaoka H. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels // IEEE Transactions on Antennas and Propagation. 2005. V. 53, No. 11. P. 3776-3784. DOI: 10.1109/TAP.2005.858853
- Mathur S., Trappe W., Mandayam N., Ye C., Reznik A. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, September 14-19, 2008. P. 128-139. DOI: 10.1145/1409944.1409960
- Premnath S.N., Gowda P.L., Kasera S.K., Patwari N., Ricci R. Secret Key Extraction using Bluetooth Wireless Signal Strength Measurements. IEEE International Conference on Sensing, Communication, and Networking (SECON), 2014. P. 293-301. DOI: 10.1109/SAHCN.2014.6990365
- Azimi-Sadjadi B., Kiayias A., Mercado A., Yener B. Robust key generation from signal envelopes in wireless networks. Proceedings of the 14th ACM conference on Computer and communications security, 2007. P. 401-410. DOI: 10.1145/1315245.1315295
- Jana S., Premnath S.N., Clark M., Kasera S.K., Patwari N., Krishnamurthy S.V. On the effectiveness of secret key extraction from wireless signal strength in real environments. Proceedings of the 15th annual international conference on Mobile computing and networking (MobiCom). 2009. P. 321-332.
- Assche G. Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, 2006. 276 p.
- Brassard G., Salvail L. Secret-Key Reconciliation by Public Discussion. Lecture Notes in Computer Science. 2001. P. 410-423.
- Shannon C.E. Communication Theory of Secrecy Systems. Bell System Technical Journal. 1949. No. 28 (4). P. 656-715.
- Duan S. Security analysis of tetra. Master’s thesis. Norwegian University of Science and Technology Department of Telematics, 2013.
- Benantar M. The Internet public key infrastructure. IBM Systems Journal. 2001. No. 40 (3). P. 648-665. DOI: 10.1147/sj.403.0648
- Shannon C. E. The Mathematical Theory of Communication. The Bell System Technical Journal. 1948. V. 27, No. 3. P. 379-423.
- Akinbiyi O. Physical layer security using artificial noise. The University of Leeds School of Electronic and Electrical Engineering, 2012.
- Wyner A.D. The Wiretap Channel. Bell System Technology Journal. 1975. V. 54, P. 1355-1387. DOI: 10.1002/j.1538-7305.1975.tb02040
- Rehman S.U., Sowerby K.W., Alam S., Ardekani I. Radio Frequency Fingerprinting and its Challenges. IEEE Conference on Communicati.ons and Network Security. 2014. P. 496-497. DOI: 10.1109/CNS.2014.6997522
- Sakai M., Lin H., Yamashita K. Sakai M. Intrinsic Interference Based Physical Layer Encryption for OFDM/OQAM. IEEE Communications Letters. 2017. No. 21 (5). P. 1059-1062. DOI: 10.1109/LCOMM.2017.2654442
- Bakhtin A.A., Volkov A.S., Baskakov A.E. Research of the implementation features of environment access algorithms in mobile self-organizing communication networks. Trudy MAI. 2017. No. 97. (In Russ.). URL: https://trudymai.ru/eng/published.php?ID=87331
- Eliseev S.O., Kryukov D.A. System of cryptographic generation of identical data based on the Diffie-Hellman algorithm. Trudy MAI. 2018. No. 101. (In Russ.). URL: https://trudymai.ru/eng/published.php?ID=97041
- Fomin A.I., Aiman Khamad. Analysis of communication reliability in channels with fast and slow fading. Trudy MAI. 2008. No. 30. (In Russ.). URL: https://trudymai.ru/eng/published.php?ID=7525
- Volkov A., Chi Jie., Gorelik A., Solodkov A., Sviridov I. Classification of radio signals in multipath fading channel using neural network. 2024 Conference Young Researchers in Electrical and Electronic Engineering (2024 ElCon), Saint Petersburg Electrotechnical University «LETI», January 29-30, 2024, Russia. P. 919-923.
- Volkov A.S., Kreindelin V.B. Algorithms for encoding algebraic non-binary cascading convolutional codes of reduced complexity. T-Comm – Telekommunikatsii i Transport. 2024. V. 18, No. 3. P. 11-18. (In Russ.). DOI: 10.36724/2072-8735-2024-18-3-11-18
- Volkov A.S. The development of simulation model of channel with burst error arrays. Trudy MAI. 2023. No. 128. (In Russ.). URL: https://trudymai.ru/eng/published.php?ID=171396. DOI: 10.34759/trd-2023-128-12
Download