A Secure Key Sharing Algorithm Exploiting Phase Reciprocity in Wireless Channels

11/30/2021
by   Shayan Mohajer Hamidi, et al.
0

This article presents a secure key exchange algorithm that exploits reciprocity in wireless channels to share a secret key between two nodes A and B. Reciprocity implies that the channel phases in the links A→ B and B→ A are the same. A number of such reciprocal phase values are measured at nodes A and B, called shared phase values hereafter. Each shared phase value is used to mask points of a Phase Shift Keying (PSK) constellation. Masking is achieved by rotating each PSK constellation with a shared phase value. Rotation of constellation is equivalent to adding phases modulo-2π, and as the channel phase is uniformly distributed in [0,2π), the result of summation conveys zero information about summands. To enlarge the key size over a static or slow fading channel, the Radio Frequency (RF) propagation path is perturbed to create several independent realizations of multi-path fading, each used to share a new phase value. To eavesdrop a phase value shared in this manner, the Eavesdropper (Eve) will always face an under-determined system of linear equations which will not reveal any useful information about its actual solution value. This property is used to establish a secure key between two legitimate users.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset
Success!
Error Icon An error occurred

Sign in with Google

×

Use your Google Account to sign in to DeepAI

×

Consider DeepAI Pro