sesa 16(8): e4

Research Article

Secret Key Generation by Virtual Link Estimation

Download1028 downloads
  • @ARTICLE{10.4108/eai.28-9-2015.2261448,
        author={Chitra Javali and Girish Revadigar and Ming Ding and Sanjay Jha},
        title={Secret Key Generation by Virtual Link Estimation},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={3},
        number={8},
        publisher={ACM},
        journal_a={SESA},
        year={2015},
        month={12},
        keywords={body-to-body communication, physical layer security, secret key generation},
        doi={10.4108/eai.28-9-2015.2261448}
    }
    
  • Chitra Javali
    Girish Revadigar
    Ming Ding
    Sanjay Jha
    Year: 2015
    Secret Key Generation by Virtual Link Estimation
    SESA
    EAI
    DOI: 10.4108/eai.28-9-2015.2261448
Chitra Javali1,*, Girish Revadigar1, Ming Ding2, Sanjay Jha3
  • 1: UNSW Australia and NICTA
  • 2: NICTA
  • 3: UNSW Australia
*Contact email: chitraj@cse.unsw.edu.au

Abstract

In recent years, researchers have explored using unique radio propagation characteristics between two devices for extracting symmetric keys. However, the state-of-the-art has the following limitations: (i) paying more attention to only when the two devices are in communication range, and (ii) generating keys only when the devices are in motion. Secret key generation for devices which are not in communication range and for stationary nodes is quite a challenging task. In this paper, we study the feasibility of generating secret keys between two devices which do not possess any direct link with the help of a trusted relay. We propose and implement our protocol using off-the-shelf commercially available resource constrained devices suitable for health-care applications which are a vital part of pervasive networks. We conduct an extensive set of experiments in an indoor environment for various scenarios involving stationary and mobile nodes. Our results show that the key generation rate increases by 20 times compared to the existing mechanisms using the same sampling frequency. We analyse the mutual information shared between the legitimate devices and eavesdroppers and our results reveal that, when at least any two of the three legitimate devices are mobile, an eavesdropper cannot obtain sufficient useful information to guess the shared keys.