Security Analysis of Quantization Schemes for Channel-based Key Extraction

Zenger, Christian and Zimmer, Jan and Paar, Christof (2015) Security Analysis of Quantization Schemes for Channel-based Key Extraction. EAI Endorsed Transactions on Security and Safety, 2 (6). e5. ISSN 2032-9393

[thumbnail of eai.22-7-2015.2260194.pdf]
Available under License Creative Commons Attribution No Derivatives.

Download (1MB) | Preview


The use of reciprocal and random properties of wireless channels for the generation of secret keys is a highly attractive option for many applications that operate in a mobile environment. In recent years, several practice-oriented protocols have been proposed, but unfortunately without a sufficient and consistent security analysis and without a fair comparison between each other. This can be attributed to the fact that until now neither a common evaluation basis, nor a security metric in an on-line scenario (e.g., with changing channel properties) was proposed. We attempt to close this gap by presenting test vectors based on a large measurement campaign, an extensive comparative evaluation framework (including ten protocols as well as new on-line entropy estimators), and a rigorous experimental security analysis. Further, we answer for the first time a variety of security and performance related questions about the behavior of 10 channel-based key establishment schemes from the literature.

Item Type: Article
Uncontrolled Keywords: channel-based key extraction, physical layer security, practice-oriented protocols, quantization schemes, on-line entropy estimation, security analysis
Subjects: H Social Sciences > H Social Sciences (General)
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
QA75 Electronic computers. Computer science
Depositing User: EAI Editor IV
Date Deposited: 26 Mar 2021 13:51
Last Modified: 26 Mar 2021 13:51

Actions (login required)

View Item
View Item