Security Evaluation of Mutual Random Phase Injection Scheme for Secret Key Generation over Static Point-to-Point Communications

Message:
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:
Physical layer secret key generation schemes, usually have two serious challenges in static point-to-point communications: 1) low key generation rate due to low entropy of channel state information and 2) security vulnerability at non-proximity regions due to spatial correlation. To solve the first challenge, local random generator-based schemes can be used. One of these schemes is mutual random phase injection, in which the channel probing signals with random phase are exchanged between the legitimate parties. In this paper, the security of the aforementioned scheme is reviewed in a static point-to-point link with a geometric secrecy approach. For this purpose, the vulnerability regions and secrecy regions are determined, and then a closed expression is provided for the key error probability. Moreover, based on the entropy analysis, the amount of eavesdropper’s equivocation about the key is calculated. The analytical results show that the eavesdropper’s equivocation is very low in static environments. In order to mitigate this weakness, we propose the idea of probing over multiple carrier frequencies instead of one frequency. The aim of this idea is to alter the equivalent channel phase, which leads to a significant increase in key entropy. As an example, the analytical results show that in static environments if single-bit quantization is utilized, the eavesdropper's equivocation about the key equals the number of different carrier frequencies which are used in the probing phase; so if channel probing is performed on a single frequency, the eavesdropper's equivocation will be only one bit, while, using the suggested idea, the eavesdropper's equivocation will be multifold. The simulation results show that if the probing process is performed on several frequencies, the vulnerability regions will decrease and the secrecy regions will increase. At the end of the paper, some suggestions are provided for further research in this field.
Language:
Persian
Published:
Journal of Electronic and Cyber Defense, Volume:10 Issue: 2, 2022
Pages:
19 to 30
magiran.com/p2521214  
دانلود و مطالعه متن این مقاله با یکی از روشهای زیر امکان پذیر است:
اشتراک شخصی
با عضویت و پرداخت آنلاین حق اشتراک یک‌ساله به مبلغ 1,390,000ريال می‌توانید 70 عنوان مطلب دانلود کنید!
اشتراک سازمانی
به کتابخانه دانشگاه یا محل کار خود پیشنهاد کنید تا اشتراک سازمانی این پایگاه را برای دسترسی نامحدود همه کاربران به متن مطالب تهیه نمایند!
توجه!
  • حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران می‌شود.
  • پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانه‌های چاپی و دیجیتال را به کاربر نمی‌دهد.
In order to view content subscription is required

Personal subscription
Subscribe magiran.com for 70 € euros via PayPal and download 70 articles during a year.
Organization subscription
Please contact us to subscribe your university or library for unlimited access!