0% found this document useful (0 votes)
20 views14 pages

Physical Layer Secret Key Generation

This document discusses physical layer secret key generation in static environments. It describes how secret keys can be generated between two parties (Alice and Bob) using characteristics of the wireless channel, while keeping them secret from an eavesdropper (Eve). The document outlines two scenarios for secret key generation - when Alice and Bob have a direct communication channel, and when they communicate through an untrusted relay. It also reviews related work on secret key generation using direct channels and with the help of a relay.

Uploaded by

Himanshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views14 pages

Physical Layer Secret Key Generation

This document discusses physical layer secret key generation in static environments. It describes how secret keys can be generated between two parties (Alice and Bob) using characteristics of the wireless channel, while keeping them secret from an eavesdropper (Eve). The document outlines two scenarios for secret key generation - when Alice and Bob have a direct communication channel, and when they communicate through an untrusted relay. It also reviews related work on secret key generation using direct channels and with the help of a relay.

Uploaded by

Himanshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

2692 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL.

15, 2020

Physical Layer Secret Key Generation


in Static Environments
Nasser Aldaghri , Student Member, IEEE, and Hessam Mahdavifar , Member, IEEE

Abstract— Two legitimate parties, referred to as Alice and Rivest–Shamir–Adleman (RSA) [3]. Asymmetric-key schemes
Bob, wish to generate secret keys from the wireless channel in are not preferred for devices with limited resources, e.g., as in
the presence of an eavesdropper, referred to as Eve, in order IoT networks, due to their complex mathematical operations.
to use such keys for encryption and decryption. In general,
the secret key rate highly depends on the coherence time of the Instead, symmetric-key cryptographic schemes are desired in
channel. In particular, a straightforward method of generating IoT networks due to their low-complexity implementations [4].
secret keys in static environments results in ultra-low rates. Such schemes require the secret keys for the encryption and
In order to resolve this problem, we introduce a low-complexity decryption to be distributed beforehand between the legiti-
method called induced randomness. In this method, Alice and mate parties. To complement the symmetric-key cryptographic
Bob independently generate local randomness to be used together
with the uniqueness of the wireless channel coefficients in order schemes, physical layer security methods can be deployed to
to enable high-rate secret key generation. In this work, two exchange secret keys between the nodes in order to be used
scenarios are considered: first, when Alice and Bob share a direct in the encryption and the decryption algorithms [5].
communication channel, and second, when Alice and Bob do The fundamental works of [6], [7] established an
not have a direct link and communicate through an untrusted information-theoretic framework to study the use of common
relay. After exchanging the induced randomness, post-processing
is done by Alice and Bob to generate highly-correlated samples randomness for secret key generation. In practice, characteris-
that are used for the key generation. Such samples are then tics of wireless links are shown to provide a great source for
converted into bits, disparities between the sequences generated the common randomness to be used for secret key generation,
by Alice and Bob are mitigated, and the resulting sequences are which have recently received significant attention [8], [9].
then hashed to compensate for the information leakage to the More specifically, the wireless channel has two main fea-
eavesdropper and to allow consistency checking of the generated
key bit sequences. We utilize semantic security measures and tures that are essential for secret key generation, namely,
information-theoretic inequalities to upper bound the probability reciprocity and randomness. The wireless channel is recip-
of successful eavesdropping attack in terms of the mutual rocal over each single coherence time interval [10], and it
information measures that can be numerically computed. Given has inherent randomness due to the variation of the chan-
certain reasonable system parameters this bound is numerically nel coefficients between different coherence time slots [8].
evaluated to be 2−31 and 2−10.57 in the first and the second
scenario, respectively. Note that the former requires an underlying synchronization
mechanism while the latter assumes a dynamic environment.
Index Terms— Information theoretic security, physical layer These features are often assumed to be available to the
security, distributed wireless systems, secret key generation,
semantic security, static environments. wireless nodes, i.e., the legitimate parties, which can then be
utilized in low-complexity secret key generation protocols at
I. I NTRODUCTION the physical layer. The setup for the key generation protocols
is as follows: the legitimate parties Alice and Bob share a
W IRELESS networks are becoming increasingly distrib-
uted in future systems, e.g., the fifth generation of wire-
less networks (5G) and the Internet of Things (IoT), which,
common wireless channel, either directly or indirectly through
a relay node. They communicate through this channel with
consequently, poses a higher risk of malicious attacks against the goal of generating a common secret key bit sequence,
message confidentiality in these systems. In general, commu- while keeping a passive eavesdropper Eve oblivious about
nication devices secure messages using either symmetric-key the generated key. Such protocols often include the following
encryption schemes such as Advanced Encryption Standard steps [9]:
(AES) [2], or asymmetric-key encryption schemes such as 1) Randomness sharing: In this step, the legitimate parties
observe correlated samples from a common source of
Manuscript received August 8, 2019; revised December 18, 2019 and
January 26, 2020; accepted February 1, 2020. Date of publication February 17, randomness, e.g., wireless channel coefficients.
2020; date of current version March 9, 2020. This work was supported in 2) Quantization: This is the process of converting such
part by the National Science Foundation under Grant CCF–1763348 and correlated samples, which are often real-valued, into
Grant CCF–1909771. This article was presented in part at the IEEE Global
Communications Conference in December 2018. The associate editor coor- binary bits.
dinating the review of this manuscript and approving it for publication was 3) Reconciliation: In general, there is a mismatch between
Dr. Yao Liu. (Corresponding author: Nasser Aldaghri.) the binary sequences observed and quantized by Alice
The authors are with the Department of Electrical Engineering and Com-
puter Science, University of Michigan, Ann Arbor, MI 48109 USA (e-mail: and Bob. Reconciliation is the process of mitigating such
[email protected]; [email protected]). mismatch between Alice’s and Bob’s bit sequences using
Digital Object Identifier 10.1109/TIFS.2020.2974621 methods such as cosets of binary linear codes.
1556-6013 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2693

4) Privacy amplification: This is the process of compensat- very-short-range communications due to power constraints for
ing for the information leakage to the eavesdropper Eve implementing coupled dynamics in practice. Moreover, several
during the aforementioned steps. prior works have considered utilizing relays for secret key
generation, as discussed next.
A. Related Work 2) Secret Key Generation With the Help of a Relay: In this
This section provides an overview of related work on secret case, there exists a relay node that assists Alice and Bob to
key generation using characteristics of wireless channel under generate the shared secret keys. The wireless characteristics
two main scenarios; the first scenario where the legitimate used for the randomness sharing in the first scenario, e.g., CSI
parties Alice and Bob have a direct communication channel and RSSI, can be similarly applicable here. Various methods
as the only means of communication, and the second scenario have been proposed in the literature to utilize relays in order
where their communication is helped by a relay node. to improve the key generation rate when Alice and Bob have a
1) Secret Key Generation Over Direct Communication direct communication link as well [33], [34]. The use of relays
Channels: In this case, different characteristics of the wireless in generating secret keys when Alice and Bob do not have a
channel can be utilized as the source of common randomness direct communication link is studied in [35]–[37]. A major
in secret key generation protocols. This includes the channel arguable assumption in these related works is that the relay
state information (CSI), the received signal strength (RSS), nodes are trusted. However, the wireless nodes, especially
and the channel phase, just to name a few [11]. As mentioned when they are considered low-complex and low-cost as in
earlier, there are two main underlying assumptions in such IoT networks, are susceptible to hacking, even after the key
protocols. First, the assumption on reciprocity of the wireless generation process is done. Hence, it is highly desirable to
channel guarantees the reliability of such protocols. Second, ensure that limited information about the generated secret
the randomness of the key is guaranteed by the assumptions key is leaked to the relay throughout the process. This is
on temporal decorrelation [12]. The resulting secret key gen- the motivation behind several other related works which
eration protocols, e.g., [8], [10], [13]–[17], where orthogonal assumed the relay nodes are untrusted. For instance, a method
frequency division multiplexing (OFDM) is utilized to increase to accommodate this case by utilizing friendly jamming is
the key rate in [17], often require dynamic environments in introduced in [38]. Another method that requires a moving
order to satisfy the second assumption and to enable secret relay to generate secret bits is proposed in [39]. Also, a novel
key generation at non-zero rates. It is worth noting that some method to resolve the issue of untrusted relays using a MIMO
imperfections of the channel measurements may occur due to architecture is suggested in [40]. Such methods, however,
mismatched hardware and synchronization errors [18]. require dynamic environments. As mentioned before, these
Wireless channels can be naturally assumed to be dynamic protocols are not appealing for applications where nodes are
assuming a certain level of mobility by users and/or in the resource-constrained and the environment is static.
surrounding environment. However, such assumptions do not
hold in static environments such as indoor IoT networks. B. Our Contributions
Consequently, the aforementioned protocols result in ultra- Our main contribution in this work is a solution, based on
low/zero secret key rates in such environments. This issue low-complexity methods, for resolving the issue of low/zero
has been studied in the literature and various solutions have rate secret key generation between two legitimate nodes in sta-
been proposed. Solutions include utilizing multiple-input- tic environments. In the proposed solution, we utilize induced
multiple-output (MIMO) antennas systems [19]–[21], beam- randomness generated by the legitimate parties and exchanged
forming [22], deploying friendly jamming [23] where the users between them. More specifically, Alice and Bob independently
act as jammers to confuse the eavesdropper, and using artificial generate a certain number of random bits. Then, they map
noise to confuse the eavesdropper [24]. In another line of these bits to quadrature amplitude modulation (QAM) symbols
work, some user-introduced randomness is utilized for various which they exchange using the direct communication channel
purposes [18], [25]–[28]. For instance, the user’s randomness (the first considered scenario) or through an untrusted relay
is used to counter certain types of attacks by the eavesdropper (the second considered scenario). After the exchange of the
in [18]. However, the use of induced randomness for key generated randomness, Alice and Bob process their received
generation, and more specifically to increase the key rate in sequences, which are the generated randomness by the other
static scenarios, is not discussed in [18]. In general, prior party and passed through the channel, using their own random
schemes that use some user-introduced randomness require sequences. The reciprocity of the channel/channels ensures
complex underlying architectures, e.g., MIMO transceivers, that they obtain highly correlated sequences. Such common
or unconstrained sources of randomness, i.e., continuous noisy randomness is then used to extract shared secret keys
sources whose Shannon entropy is infinity, which are expen- by following quantization, reconciliation, and privacy ampli-
sive to implement [29]. This, in turn, makes them unappealing fication steps. The reliability and the security of the proposed
for applications where nodes experience a static environ- protocols are analyzed by upper bounding the probability of
ment and have limited resources, e.g., IoT networks, sensor falsely accepting a mismatched secret key and the probability
networks, etc. Also, solutions based on utilizing coupled of a successful eavesdropping attack by Eve, respectively.
dynamics existing in synchronization mechanisms [30], [31] While most of prior works on designing physical layer secret
and based on full-duplex communications [32] are proposed key generation protocols rely on spatial decorrelation assump-
for low-complexity IoT networks, which are often limited to tions to guarantees the security of the key, we provide, to the

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2694 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020

best of our knowledge, the first rigorous result on upper


bounding the probability of successful eavesdropping attack in
such protocols. It is worth noting that although the motivation
behind the design of the proposed protocols is to resolve
the issue of environment immobility, they work in dynamic
environments as well assuming that the wireless channel does
not change during each session of randomness exchanges.
The proposed protocols are considered under two major
scenarios. In the first scenario, secret key generation over
a direct communication channel is considered, which was
presented in part in [1]. In the second scenario, secret key
Fig. 1. System model for direct secret key generation.
generation with the help of an untrusted relay is considered
assuming that there is no direct communication link between
Alice and Bob. In the proposed protocols, a communication A. Direct Secret Key Generation
scheme based on OFDM is assumed to increase the secret key
rate as in [17]. Furthermore, we utilize secure sketch [41] and The channel between Alice and Bob is assumed to be
universal hash functions (UHF) [42] to ensure reliability and an authenticated wireless channel, but it is not secure. The
security of the generated keys while enhancing the randomness eavesdropper Eve is assumed to be a passive eavesdropper. The
of the key bit sequences. Numerical results are provided for setup of the considered secret key generation (SKG) system
the proposed protocol assuming reasonable parameters in the is shown in Figure 1. The wireless channel considered in this
communication setup. These parameters include the modu- work is assumed to be a fading channel. Suppose that Alice
lation order, the number of OFDM subcarriers, the signal- transmits a signal x Alice (t) to Bob, he receives
to-noise ratio (SNR), and the quantization resolution. Then, yBob (t) = x Alice (t)  h ab (t) + n b (t), (1)
various fundamental metrics are characterized including the bit
generation rate (BGR), the bit mismatch rate (BMR), the bit where t denotes the time,  denotes the convolution operator,
error rate (BER), and the randomness of the key generated h ab (t) denotes the circularly-symmetric Gaussian-distributed
using the National Institute of Science and Technology (NIST) channel response with mean 0 and variance σh2 /2 in
randomness tests [43]. In addition, a setup in which realistic each dimension, and n b (t) denotes the circularly-symmetric
channel coefficients for 5G millimeter wave (mmWave) chan- Gaussian-distributed additive noise component with mean 0
nels are generated by the NYUSIM Channel Simulator [44] is and variance σn2 /2 in each dimension. In the case of flat
considered, assuming the first scenario, in order to evaluate the fading channels, the convolution converts to multiplication and
protocol in a realistic environment. Furthermore, we introduce the channel response is the Rayleigh-distributed fading gain
a new efficiency measure for protocols that utilize induced coefficient with parameter σ , i.e., |h ab | ∼ Rayleigh(σ ), and
randomness. This parameter, called randomness efficiency, the phase is uniformly distributed, i.e., φ(h ab ) ∼ U [−π, π].
measures what percentage of the induced randomness is The same applies when Bob transmits x Bob(t) to Alice, she
utilized in the generated common random sequence. The receives
randomness efficiency in the first scenario is 50 %, while it yAlice (t) = x Bob (t)  
h ab (t) + n a (t). (2)
is 33 % in the second scenario.
The rest of this paper is organized as follows. The system The distribution of the channel coefficients h ab will be slightly
models for the two considered scenarios are discussed in different in Section V-A.2 for the numerical evaluation of the
Section II. In Section III, the proposed protocols for generating protocol assuming realistic 5G mmWave coefficients. More
secret keys are discussed. In Section IV, the security of the specifically, samples of Rayleigh distribution are replaced with
proposed protocols is analyzed. Numerical results are provided realistic 5G mmWave channel coefficients considered in [44].
in Section V. Finally, the paper is concluded in Section VI. Wireless channels are essentially reciprocal [8], meaning
that the CSI observed at Bob’s end from Alice is the same as
II. S YSTEM M ODEL Alice’s end from Bob assuming an underlying synchronization
mechanism. The reciprocity property, i.e., h ab ≈  h ab , is the
Secret key generation protocols consist of two legitimate
key to most of the secret key generation protocols that utilize
parties Alice and Bob who aim to generate a common, random,
characteristics of the physical layer channel. Also, Alice and
and secure bit sequence using an authenticated shared wireless
Bob are assumed to use OFDM. Suppose that Alice and Bob
channel between them. In addition to Alice and Bob, there
transmit the j -th element of the vectors xAlice (t) and xBob (t) ,
is an authenticated relay node named Carol, who is honest
respectively, over the j -th OFDM subcarrier. The received
but curious, and is able to help Alice and Bob generate such
signals are expressed as follows:
keys by relaying their signals when no direct channel exists
between them. As the legitimate parties execute the secret key yAlice (t) = xBob (t) ◦ 
hab (t) + na (t), (3)
generation protocol, a passive eavesdropper Eve is observing yBob (t) = xAlice (t) ◦ hab (t) + nb (t), (4)
all communications between Alice, Bob, and Carol, and tries
to learn as much information as possible about the secret key where ◦ denotes the Hadamard product, i.e., the element-wise
being generated and shared between Alice and Bob. product. By using the received signals at Alice and Bob

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2695

dimension-variance σg2 /2. On the other hand, the j -th elements


of the vectors nr (t), na (t), and nb (t) are independent and
circularly-symmetric Gaussian-distributed with mean 0 and
dimension-variance σn2R /2, σn2A /2, and σn2B /2, respectively.
Finally, Alice and Bob use their received signals and utilize
the uniqueness of the wireless channel coefficients between
them and Carol to extract a secret key. As in the direct
secret key generation scenario, a noiseless public channel is
available between Alice and Bob through Carol which Eve has
access to. Such a channel can be realized by using appropriate
off-the-shelf modulation and coding schemes from Alice to
Carol, from Carol to Bob, and vice versa.
Fig. 2. System model for relay-based secret key generation. Remark: The relay employs an amplify-and-forward (AF)
function with amplification factor α. The relay node is placed
such that α can be selected according to a certain desired
together with the uniqueness of wireless channel coefficients
criterion such as maintaining the average transmitted power at
between them they aim at extracting a shared secret key. Note
the relay, or maintaining the average SNR at the receiver, see,
that in addition to the wireless channel, Alice and Bob are
e.g., [45] for a detailed discussion. To implement the protocols
assumed to share a noiseless public channel that Eve has
proposed in this paper, a similar criterion can be adopted since
access to. This channel can be realized by using appropriate
the aim is to create highly correlated sequences which depends
off-the-shelf modulation and channel coding schemes.
on the average received SNR at Alice and Bob. Also, for
simplicity it is assumed that the amplification factor is the
B. Secret Key Generation Using a Relay same for the transmissions to Alice and Bob; however, it can
In this case, Alice and Bob do not have access to a direct be different for each of them to achieve some specific metric
wireless channel. Instead, there is an intermediate party, also such as the received SNR. The reciprocity property of the
referred to as Carol, operating as a relay node with whom indirect channel between Alice and Bob holds in this scenario,
Alice and Bob share authenticated wireless channels which are since the reciprocity of the individual channels between Alice
not secure. The relay is considered to be amplify-and-forward and Carol, and Carol and Bob still holds.
and is assumed to be compliant with the protocol, i.e., it ampli-
fies and forwards the signals without tampering with their
C. Evaluation Metrics for SKG Protocols
contents. However, the relay is considered to be untrusted.
This is because it might be susceptible to hacking attacks by Metrics that are often used to evaluate the performance of
an adversary or might be simply curious to learn the contents secret key generation protocols are as follows [14]:
communicated between Alice and Bob. The eavesdropper 1) Bit Generation Rate (BGR): This measures the number
Eve is considered to be a passive eavesdropper. The system of bits per packet in the quantized sequences generated
model is shown in Figure 2. Similar to the model discussed in by Alice and Bob, denoted by qa and qb , respectively.
Section II-A, the channel between each two entities is modeled 2) Bit Mismatch Rate (BMR): This measures the ratio of
as a wireless fading channel. Alice, Bob, and Carol utilize the number of bits that are mismatched between qa
OFDM in their transmissions. Alice wishes to transmit a signal and qb . This quantity can be also measured at Eve’s
xAlice (t) to Bob through the relay node Carol. First, Alice side. Note that the BMR at Eve should be higher than
transmit xAlice (t) to Carol, who receives the BMR measured between Alice and Bob; otherwise,
no secret key can be generated.
yCarol (t) = xAlice (t) ◦ h(t) + nr (t). (5) 3) Bit Error Rate (BER): This measures the ratio of the
Next, the relay amplifies the signal using amplification factor number of bits that do not match in the final key gener-
α and forwards the amplified signal to Bob. Bob receives ated by Alice and Bob as the output of the protocol. This
quantity can be also measured at Eve’s side, which,
yBob (t) = α ◦ yCarol (t) ◦ 
g(t) + nb (t) (6) ideally, should be close to 50%.
= α ◦ (xAlice (t) ◦ h(t) + nr (t)) ◦ 
g(t) + nb (t), (7) 4) Randomness: This indicates whether the final key bit
sequence generated by the protocol, denoted by Kab ,
which holds due to the use of OFDM in transmissions between is indistinguishable from a random binary bit sequence.
Alice, Carol, and Bob. The same applies when Bob transmits This is often tested using the NIST statistical test
xBob (t) to Alice through Carol. Alice receives suite [43].
yAlice (t) = α◦(xBob (t) ◦ g(t) + nr (t))◦
h(t) + na (t), (8) In addition to the aforementioned metrics, we introduce a
new parameter, referred to as randomness efficiency, to mea-
where the j -th elements of the vectors h(t),  h(t) are sure the length of the shared sequence normalized by the
both circularly-symmetric Gaussian-distributed with mean total amount of randomness available to Alice and Bob. Let
0 and dimension-variance σh2 /2, and g(t),  g(t) are also R Q denote the total number of shared random bits after
circularly-symmetric Gaussian-distributed with mean 0 and quantization. The randomness efficiency, denoted by E R ,

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2696 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020

TABLE I
N OTATION S UMMARY FOR THE i - TH SKG S ESSION

is defined as
def RQ
ER = , (9)
H (S) + H (V )
where H (S) and H (V ) are the entropy of Alice’s and Bob’s
sources of randomness, respectively.

III. P ROPOSED P ROTOCOLS Fig. 3. Direct secret key generation protocol overview of a single session.
The proposed protocols for both scenarios, i.e., secret key
generation using a direct channel and relay-based secret key
generation, can be partitioned into four stages: induced ran- A. Induced Randomness Exchange
domness exchange, quantization, reconciliation, and privacy In this stage we aim at creating highly correlated yet random
amplification together with consistency checking. The first observations at Alice and Bob. We discuss this stage separately
stage, i.e., induced randomness exchange, is done differently for the two considered scenarios as follows:
in the two considered scenarios, while the remaining stages 1) Direct Induced Randomness Exchange: In this stage,
are similar. Alice and Bob exchange randomly generated symbols with
In the first stage, the randomness is induced by Alice and each other. In the i -th session, Alice chooses a vector si of
Bob at each of the N OFDM subcarriers, provided that each length N and Bob also chooses a vector vi of length N.
two-way exchange is done within the same coherence time Each element of the vectors si and vi is chosen independently
interval. After the exchange of induced randomness, Alice and and uniformly at random from a set of M symbols in a
Bob process what they receive by performing quantization fol- M-QAM constellation. Then, the symbols are multiplied by
lowed by reconciliation to correct the disparities between their a pulse/carrier signal for transmission. The reason behind
bit sequences. As a result, they obtain, with high probability, choosing the symbols from M-QAM constellation is that the
identical bit sequences. Then, they use privacy amplification hardware for transmitting and receiving QAM symbols is
to improve the security of the generated bit sequences. Finally, readily available in many wireless devices. After the exchange
they check whether their keys are consistent or not. If the keys of random symbols, Alice and Bob multiply what they sent
are not consistent, they re-initiate a new session. The notations with what they received. This results in random sequences
for various vectors in the protocol are summarized in Table I. wi,ab and  wi,ab available at Alice and Bob, respectively,
Also, Figure 3 shows an overview of a single session of the key as follows:
generation protocol for the scenario involving a direct channel,
and Figure 4 shows a single session of the relay-based secret wi,ab = si ◦ vi ◦ 
hi,ab + si ◦ ni,a , (10)
key generation protocol. For ease of notation, we remove wi,ab = si ◦ vi ◦ hi,ab + vi ◦ ni,b .
 (11)
the time index t from the functions while keeping in mind
that the exchanges are done within the same coherence time. These two vectors are random and highly correlated, as will
Next, detailed descriptions of various stages of the proposed be shown, which makes them suitable for extracting shared
protocols are discussed. secret keys between Alice and Bob.

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2697

way that the received SNRs at the relay with respect to the
received sequences from Alice and Bob are the same, and
equal to a predetermined value. The relay receives
yi,2,r = si ◦ hi + vi ◦ gi + ni,2,r . (14)
Then, it amplifies yi,2,r with an amplification factor α, which is
chosen to meet a specific SNR at Alice and Bob, and forwards
the amplified signal to Alice and Bob who receive yi,3,a and
yi,3,b , respectively, as follows:
yi,3,a = α(si ◦ hi + vi ◦ gi + ni,2,r ) ◦ 
hi + ni,3,a , (15)
yi,3,b = α(si ◦ hi + vi ◦ gi + ni,2,r ) ◦ 
gi + ni,3,b . (16)
The value of the amplification factor α is assumed to be
publicly known. Alice and Bob utilize what they receive
from the relay together with their locally generated vectors,
their channel estimates, and α in order to construct highly
correlated samples. More specifically, the self-interference
terms αsi ◦ hi ◦ 
hi and αvi ◦ gi ◦ gi are cancelled at Alice
and Bob, respectively, using their local randomness and the
channel estimates. The results are normalized by α and then
multiplied by the local randomness, which results in wi,ab and

wi,ab at Alice and Bob, respectively, as follows:
wi,ab = si ◦ vi ◦ gi ◦ 
hi + 
ni,3,a , (17)

wi,ab = si ◦ vi ◦ 
gi ◦ hi + 
ni,3,b , (18)
where
ni,3,a = s◦2
 
i ◦ zi,a + si ◦ ni,2,r ◦ hi + si ◦ ni,3,a /α, (19)
ni,3,b = v◦2
 i ◦ zi,b + vi ◦ ni,2,r ◦ 
gi + vi ◦ ni,3,b /α, (20)
are the noise terms. The two vectors wi,ab and 
wi,ab observed
by Alice and Bob are highly correlated and random at each
session, which makes them suitable for extracting secret keys.
Fig. 4. Relay-based secret key generation protocol overview of a single
session.
B. Quantization
In this stage, the complex-valued shared sequences wi,ab
2) Relay-Based Induced Randomness Exchange: First, and wi,ab are turned into bit streams. We use a similar
the relay transmits a known probing vector p to Alice and quantization method as suggested in [13]. A brief description
Bob, who receive yi,1,a and yi,1,b , respectively, specified as of the quantization scheme is included next. After collecting
follows: the complex-valued measurements wi,ab and  wi,ab , they are
sorted as shown in Figure 5. Then, Alice and Bob find the
yi,1,a = p ◦ 
hi + ni,1,a , (12)
range of sorted data, which is defined as the difference between
yi,1,b = p ◦ 
gi + ni,1,b . (13) the maximum value and the minimum value of the sorted
Alice and Bob then estimate the channels between them- vectors. Then, using the range and the quantization resolution
selves and the relay, i.e., 
hi and 
gi , respectively, using their δ, they identify  = 2δ uniform quantization intervals, and
observations. Their estimates are denoted by hi and  gi with assign a Gray-code sequence to each interval. Finally, they
  ◦2 map each sample to its quantized bit sequence based on the
estimation errors defined as zi,a = (hi ◦ hi − hi ) and
interval it belongs to. The resulting bit sequences for Alice
zi,b = (gi ◦ 
gi − g◦2
i ), respectively, where (.)
◦2 denotes the
and Bob are denoted by qi,a and qi,b , respectively.
element-wise square operation. Alice and Bob utilize their
respective channel estimates together with their respective
local randomness to eliminate the self-interference terms and C. Reconciliation
to generate the correlated samples, to be described next. The aim of this stage is to mitigate disagreements between
Alice and Bob generate, independently and uniformly at Alice’s and Bob’s quantized bit sequences. To this end, var-
random, vectors of length N consisting of M-QAM symbols. ious methods, such as error-correcting codes, can be used.
Let si and vi denote Alice’s and Bob’s vectors, respectively. In our protocols we use error-correcting code-based secure
They use the probing vector p also for synchronization and, sketch [41], while picking a convolutional code as the under-
simultaneously, transmit their vectors to the relay in such a lying code. The reason to pick convolutional codes is due to

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2698 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020

D. Privacy Amplification Consistency Checking


Since some information about the shared key is leaked to
Eve during the exchange of random symbols and the recon-
ciliation stages, we exploit universal hash functions (UHF) to
increase the level of security. In general, UHFs are desired in
such scenarios due to their resilience against collisions.
Fig. 5. Sorting wi,ab values before feeding them to the quantizer. Definition 2 [42]: A family of hash functions H that maps
a set of inputs U , e.g., binary vectors of length n, to a value
in the hash table of size t is called universal if for any two
the simplicity of the encoding process using shift registers and inputs x, y ∈ U with x = y, we have
the decoding process using Viterbi decoders [46]. A formal
definition of a general secure sketch scheme is as follows: 1
Pr (h(x) = h(y)|x = y) ≤ . (23)
Definition 1 [47]: An (M, m 1 , m 2 , t)-secure sketch h←H t
scheme consists of a sketch function, and a recovery function We also use UHFs to check consistency between keys
such that the following properties hold: generated by Alice and Bob, without leaking any information
1) The sketch function takes an input w ∈ M and returns to Eve, as suggested in [15].
a randomized SS(w) ∈ {0, 1}∗ . Given that h should be chosen randomly from H , the ques-
2) The recovery function takes SS(w) and w̃ ∈ M, and tion is how do we ensure that Alice and Bob agree on the
returns w with probability one as long as the distance same h? We propose a method that guarantees the same choice
between w and w̃ is less than a certain threshold t. of h at Alice and Bob if inputs to the UHF are consistent.
3) For any random variable W over M with min-entropy Suppose we have a random binary sequences qi of length n
m 1 , an adversary observing SS(W ) has an aver- (This is qi,a for Alice and  qi,a for Bob). For simplicity,
age min-entropy of W conditioned on SS(W ) as we assume that n is an even multiple of some integer m ≥ 1.
H̃∞ (W |SS(W )) ≥ m 2 . We divide qi into two sequences of equal length qi = qi,1 qi,2
Note that the min-entropy function of a random variable each of length n/2, which is an integer since n is even. Then,
X is computed as H∞ (X) = − log2 (max(Pr(X = x))) and qi,1 is used to choose h from H , and qi,2 is used as the input to
x
the average min-entropy function of X conditioned on Y is the hash function h. Next, a well-known construction of UHF
computed as H̃∞ (X|Y ) = − log2 E [2−H∞ (X |Y =y) ] . is described that we use in our protocol [42]. First, the largest
y←Y prime p with 2m−1 < p < 2m , i.e., its binary representation
Next, we describe a construction known as the code-offset consists of m bits, is chosen, where m is the length of the
secure sketch [41]. The encoder is chosen in such a way that output bit sequence (such a prime number always exist for
the length of its output is equal to the length of qi,a . Once the m > 1 by Bertrand’s postulate). Then, for i = 1, 2, we divide
quantized sequences qi,a and qi,b are available, Alice chooses qi,1 and qi,2 into l parts qi,1,k and qi,2,k for k = 1, 2, . . . , l,
a bit string r uniformly at random and encodes it using the where the length of each part is less than or equal to m bits.
convolutional encoder to get Enc(r), which is of the same For ease of notation, let qi, j,k also denote the number with the
length as qi,a . Then, she computes binary representation qi, j,k . Finally, the following summation
SS = qi,a ⊕ Enc(r), (21) is computed:

where ⊕ is the addition modulo 2, and transmits the resulting 


l

sequence over the noiseless public channel, either directly as in h qi,1 (qi,2 ) = qi,1,k qi,2,k mod p. (24)
the first scenario or through the relay as in the second scenario, k=1
to Bob. Then, Bob takes the addition modulo 2 of SS and qi,b , Next, the randomness of qi is discussed. In our protocol,
feeds it to the Viterbi decoder to get  r, and re-encodes r to si and vi are chosen uniformly at random for each key genera-
get Enc( r). He computes the final sequence as tion session. Hence, the value of qi is also random. Therefore,
the hash function is randomized during each session, which
qi,a = SS ⊕ Enc(Dec(SS ⊕ qi,b ))

will be verified in the numerical results section. The output
= SS ⊕ Enc(
r). (22) of the aforementioned described hash function is the key
Remark: A binary linear code of length n and dimension bit sequences Ki,ab for Alice and K i,ab for Bob, which are
k with minimum distance 2t + 1 can be used to build matched with high probability given the reconciliation step.
an (F n , m 1 , m 1 − (n − k), t)-secure sketch scheme, where Before Alice and Bob are able to use the key sequences for
F = {0, 1} for binary codes [47]. The error correction capa- encryption and decryption, they need to verify the consistency
bility of the linear code is related to the underlying rate of the of their keys. To this end, Alice and Bob hash their key
code. This introduces a trade-off between the error correction sequences Ki,ab and K i,ab again similar to the previously
capability and the security, as higher rates provide better described process. The output of this step is their respective
security but can correct less errors, and vice versa. Alice and check sequences Ci,ab and  Ci,ab , which they use to verify
Bob should start with an initial high rate code and then reduce whether or not their keys are consistent. It is worth noting
it accordingly if they observe several consecutive unsuccessful that, in our protocol, the length of the check sequences,
attempts of the protocol. Ci,ab and Ci,ab , is half the length of the key.

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2699

Theorem 1: The probability of accepting a mismatched key This can be calculated in each subcarrier as stated in the next
as consistent by the described protocol with hash table size p lemma.
for the check sequence is upper bounded as follows: Lemma 1: Let h bk and h ek denote the fading coefficients
of Bob’s and Eve’s channels at the k-th subcarrier. Also,
Pr(Ci,ab =  i,ab ) ≤ 1 .
Ci,ab |Ki,ab = K (25) let ρ denote the correlation coefficient between h bk and h ek ,
p
specified in (30). Then, the mutual information between h bk
Proof: This follows directly from the definition of uni- and h ek is given by
versal hash functions, specified in (23), where the output hash
table size is p. I (h bk ; h ek ) = − log(1 − ρ 2 ) bits. (31)
Proof: We have h bk = h bk,I + j h bk,Q , and h ek =
IV. ATTACKER M ODEL AND THE R ESILIENCE h ek,I + j h ek,Q . h bk,I , h bk,Q are independent and identically
OF P ROPOSED P ROTOCOLS distributed as N (0, σb2 /2) and h ek,I , h ek,Q are independent
In this section we discuss eavesdropping strategies by the and identically distributed as N (0, σe2 /2). The real parts of
passive eavesdropper Eve in both scenarios, i.e., whether the Bob’s and Eve’s channel coefficients are correlated with the
communication is through a direct communication channel or parameter ρ, and the imaginary parts are also correlated
through a relay, and provide an upper bound on the probability with ρ. Then, we have the following covariance matrices:
of a successful eavesdropping attack.  2   2 
σb /2 0 σe /2 0

1 = ,
2 = , (32)
0 σb2 /2 0 σe2 /2
A. Direct Secret Key Generation ⎡ ρσb σe ⎤
σb2 /2 0 0
In this scenario, Eve’s best strategy is to acquire si , vi and ⎢ 2 ρσb σe ⎥
⎢ 0 σb2 /2 ⎥
hi,ab . When Alice and Bob exchange signals, Eve receives ⎢ 0 ⎥

3 = ⎢ ⎢ ρσb σe
2 ⎥.
⎥ (33)
ei,1 = si ◦ hi,ae + ni,e1 , (26) ⎢ 0 σe /2
2
0 ⎥
⎣ 2 ρσb σe ⎦
ei,2 = vi ◦ hi,be + ni,e2 . (27) 0 0 σe2 /2
2
If Eve is able to estimate both si and vi from her observations Then, the following series of equalities holds:
in (26) and (27) perfectly, she can create samples of the
following form: I (h bk ; h ek ) = I (h bk,I + j h bk,Q ; h ek,I + j h ek,Q )
(a)
= I (h bk,I , h bk,Q ; h ek,I , h ek,Q )
wi,ed ,1 = si ◦ vi ◦ hi,ae + ni,e3 , (28)
(b)
wi,ed ,2 = si ◦ vi ◦ hi,be + ni,e4 . (29) = Hd (h bk,I , h bk,Q ) + Hd (h ek,I , h ek,Q )
− Hd (h bk,I , h bk,Q , h ek,I , h ek,Q )
Note that she still needs to know hi,ab at all different sub-
(c) 1 1
carriers in order to obtain wi,ab and/or wi,ab , as described in = log(det(2πe
1 )) + log(det(2πe
2 ))
(10) and (11). Luckily, this is, almost, not possible for Eve as 2 2
1
discussed next. − log(det(2πe
3 ))
In general, the Pearson correlation coefficient ρ of the 2
(d)
channel fading coefficients at locations separated by distance = log(πeσb2 ) + log(πeσe2 )
d can be computed as follows [12]: − log((πeσb σe )2 (1 − ρ 2 ))
(e)
ρ = [ J0 (kd)]2 , (30) = − log(1 − ρ 2 ), (34)
where J0 (.) is the Bessel function of first kind, and k is the where:
wavenumber. Therefore, if the distance between Alice/Bob and (a) holds due to having a one-to-one mapping;
Eve is larger than half of the wavelength λ/2, e.g., 5 cm (b) is the expansion of the mutual information expression
in 3GHz band, they will experience almost uncorrelated fad- in terms of differential entropy;
ing channels. Therefore, the leaked information about the (c) holds by using the well-known expression that the
generated secret key to Eve is small and is often assumed differential entropy of multivariate Gaussian random variables
to be negligible in the literature. However, it is fundamen- Xn = (X 1 , X 2 , . . . , X n ) with covariance matrix
i is
tally important to quantitatively measure the security level. Hd (Xn ) = 12 log(det(2πe
i )); and (d) and (e) are simplifi-
An information-theoretic measure of security is the mutual cation steps.
information between the shared random sequence, from which Note that as ρ goes to zero, the mutual information, given
the secure key will be generated, and what Eve observes. by Lemma 1, also goes to zero.
If we assume that the effect of quantization is negligible and The next question, which also applies to any physical layer
also assume that Eve can perfectly recover si and vi , this security scheme that utilizes information-theoretic measures
mutual information is equal to the mutual information between of security, is how to quantitatively characterize the chances
hi,ab and the pair (hi,ae , hi,be ). One can assume that Eve is of a successful eavesdropping attack by Eve, i.e., guessing the
closer to Bob than Alice and hence, only consider the mutual key, given the leaked information? The latter is often measured
information between hi,ab and hi,ae as the dominating term. in terms of semantic security, which is a classical notion of

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2700 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020

security in cryptosystems [48]. Direct connections between and/or  wi,ab , as described in (17) and (18). Her best strategy
metrics for the information-theoretic security, based on the is to find si , vi , gi and hi . When Alice and Bob transmit their
mutual information, and cryptographic measures of security, induced randomness, Eve receives
including semantic security, are provided in [49]. We use
these connections to arrive at the following theorem which wi,e,1 = si ◦ hi,ae + vi ◦ gi,be + ni,e5 . (36)
characterizes the security of the proposed protocol from the
However, when Carol, the relay, amplifies and forwards the
aforementioned perspective:
signal from Alice and Bob, Eve receives
Theorem 2: Let N denote the number of subcarriers used in
the proposed protocol and δ denote the quantization resolution. ei,3 = α(si ◦ hi + vi ◦ gi + ni,2,r ) ◦ fi,ce + ni,e6 . (37)
Then, the probability of a successful eavesdropping attack by
Eve is upper bounded as follows: Since Eve can estimate the channel coefficients fi,ce from
  N the relay’s transmission when it transmits the known probing
Pr(Successful attack) < 2−2δ + 2I (h b ; h e ) + 2−δ N , vector and, also, she knows the value of α from the messages
(35) over the public channel, she can successfully estimate
where h b and h e denote the fading coefficients of wi,e,2 = si ◦ hi + vi ◦ gi + ni,2,r . (38)
Bob’s and Eve’s channels at a subcarrier.
Proof: [49, Theorem 5] relates the mutual information In a worst-case scenario from the legitimate parties’ perspec-
between Bob’s and Eve’s observations to the increase in the tive, Eve has as much information as the relay has, in addition
probability of a successful eavesdropping attack by Eve given to her own observations. Note that this coincides with the
her observations. More specifically, the increase in the latter problem of securing the shared key against the untrusted
probability is quantified in terms of the mutual information relay Carol when Eve is at Carol’s location. In the remaining
between Bob’s and Eve’s observations [49, Theorem 5]. Note of this section, we analyze the probability of a successful
that the probability that Eve successfully guesses the bits, with eavesdropping attack assuming that the eavesdropper Eve has
no observations, at a single subcarrier is 2−2δ . In addition to all the information available to Carol, in addition to her own
that, by [49, Theorem 5], the probability that Eve can guess observations.
the shared random bits in a single subcarrier, given Note that the computations involving the spatial correlation
√ her obser-
vations in this subcarrier, is increased by at most 2 I (h b ; h e ) parameter of the wireless channels do not help in ensuring
compared to the case where she does not have any observation. the security in this scenario as they do in the first scenario
Therefore, Eve’s probability of successfully guessing these with a direct communication channel. Also, the mutual infor-

quantized key bits is upper bounded by 2−2δ + 2 I (h b ; h e ). mation between wi,ab , as described in (17), and the pair
The probability that Eve can recover the shared randomness (wi,e,1 , wi,e,2 ), as described in (36) and (38), respectively,
√ N
over all subcarriers is then given by 2−2δ + 2I (h b ; h e ) . is expected not to be very small as it was in the first scenario.
Note that I (h b ; h e ) is the same across all the subcarriers and For instance, if this mutual information is greater than 0.5, then
is actually computed in terms of ρ in Lemma 1. If Eve cannot using [49, Theorem 5], same as in the proof of Theorem 2,
recover all the shared randomness, the probability that she does not yield a non-trivial upper bound on the probabil-
can guess the secret key correctly, by the property of hash ity of a successful eavesdropping attack. Hence, instead of
functions in the privacy amplification part of our protocol, is at utilizing semantic security, we need to use an alternative
most 2−δ N , when using a key sequence of half the quantized approach to relate I (wi,ab ; wi,e,1 , wi,e,2 ) to the probability of
bit sequence length. Utilizing these together with the union a successful eavesdropping attack. To this end, we use Fano’s
bound completes the proof. inequality to bound the probability of successful estimation
Note that Theorem 2 together with Lemma 1 can be used of the quantized bits qi,a by the eavesdropper in terms of
to provide a numerical upper bound on the probability of a the conditional entropy of the quantized bits qi,a given the
successful eavesdropping attack given a lower bound on the eavesdropper’s observations (wi,e,1 , wi,e,2 ). Note that the latter
distance between Eve and both Alice and Bob. For instance, can be bounded in terms of I (wi,ab ; wi,e,1 , wi,e,2 ). The details
suppose that the distance between Eve and Bob is at least half of this analysis are given next in the proof of Theorem 3.
of a wavelength, i.e., d = λ/2 and is less than the distance To simplify the expressions in the next theorem, let us
between Eve and Alice. Then, the correlation coefficient ρ is consider an arbitrary subcarrier and denote the corresponding
at most 0.09 and by Lemma 1 the resulting mutual information entries of the vectors wi,ab , wi,e,1 , wi,e,2 , and qi,a as wab , we,1 ,
I (h b ; h e ) is at most 0.01 bits at any of the subcarriers. Suppose we,2 , and qa , respectively. Note that the result of Theorem 3
that N = 16 and δ = 2, which are also used in the numerical does not depend on the choice of the subcarrier.
results provided in the next section. Then, by Theorem 2, Theorem 3: Let N denote the number of subcarriers used in
the probability of a successful attack by Eve given such the proposed protocol and δ denote the quantization resolution.
parameters is at most 2−37 + 2−32 < 2−31 . Then, the probability of a successful eavesdropping attack by
Eve is upper bounded as follows:
B. Relay-Based Secret Key Generation  H (qa ) − Iab,e − 1  N
Pr(Successful attack) < 1 − + 2−δ N ,
In this scenario, Eve tries to use her observations and the log2 (|Q A |)
messages transmitted over the public channel to guess wi,ab (39)

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2701

where Iab,e denotes I (wab ; we,1 , we,2 ), Q A denotes the sup- results in a realistic environment, a certain number of channel
port of qa , and |Q A | denotes its cardinality. coefficients is generated by the NYUSIM Channel Simula-
Proof: Let C denote the event of correct estimation of qa tor [44]. The simulator is used to generate channel coefficients
and E denote the event of erroneous estimation of qa by the for realistic 5G mmWave channels from measurement-based
eavesdropper. Then, we have the following models. A description of the three setups is discussed next,
followed by numerical results shown for all the considered
Pr(C) = 1 − Pr(E) (40)
setups.
(a) H (qa |we,1 , we,2 ) − 1
≤ 1− (41)
log2 (|Q A |)
A. Setup
(b) H (q a ) − I (qa ; we,1 , we,2 ) − 1
= 1− (42) 1) Direct Secret Key Generation: In this scenario, it is
log2 (|Q A |)
assumed that Alice and Bob communicate over a direct and
(c) H (qa ) − I (wab ; we,1 , we,2 ) − 1
≤ 1− (43) reciprocal wireless channel. The constellation size for each
log2 (|Q A |) subcarrier is M = 16, i.e., the set of 16-QAM symbols
(d) H (qa ) − Iab,e − 1 are used as the set from which local randomness is chosen
= 1− , (44)
log2 (|Q A |) and transmitted by Alice and Bob. Also, N = 16 OFDM
where: subcarriers are assumed to be available in the channel between
(a) holds by Fano’s inequality [50]; Alice and Bob. The quantization is done with δ = 2, i.e., the
(b) is the expansion of conditional entropy; real and imaginary parts of the received symbol in each
(c) follows from the data processing inequality because qa is subcarrier are quantized into one of the four possibilities
a deterministic function of wab and hence, (we,1 , we,2 ), wab , as discussed in Section III-B. Finally, the remaining steps
and qa form a Markov chain; including secure sketch, hashing, and consistency checking are
(d) is a change of the notation of I (wab ; we,1 , we,2 ) to Iab,e . performed as discussed in Section III.
Note that the probability of correctly estimating every bit of 2) NYUSIM-Based Secret Key Generation: In this scenario,
qa , denoted by Pr(CN ), is equal to the probability of correctly it is assumed that Alice and Bob have a direct reciprocal
estimating qa over all the N subcarriers, since the computation wireless channel where the coefficients are generated by the
of mutual information is the same over all subcarriers. Hence, NYUSIM Channel Simulator [44]. They operate in a non-line-
by using the independence of such events across the N of-sight (NLOS) urban micro-cellular environment at 20◦ C,
subcarriers, we have the operating frequency is 28 GHz, and the distance between
 H (qa ) − Iab,e − 1  N
Alice and Bob and Alice and Eve is 10 meters. The path
Pr(CN ) ≤ 1 − . (45) contains 1 meter of foliage, and there is an outdoor-to-indoor
log2 (|Q A |) low loss. Channel coefficients between Alice and Bob and
If Eve cannot recover all the shared randomness bits in a channel coefficients between Alice and Eve are generated by
single session, the probability that she correctly guesses the the NYUSIM Channel Simulator over N = 16 subcarriers.
secret key, by the property of hash functions in the privacy Alice and Bob choose their induced randomness from the set
amplification part of our protocol, is at most 2−δ N . This, of 16-QAM symbols, and the quantization is done with δ = 2.
together with (45), and using the union bound complete the The remaining steps follow as in the first scenario.
proof. 3) Relay-Based Secret Key Generation: In this scenario, it is
Next, we illustrate how Theorem 3 can be used in a numer- assumed that Alice and Bob have direct and reciprocal wireless
ical setup to upper bound the probability of a successful channels with the relay, which can be perfectly estimated.
eavesdropping attack by Eve. Suppose that Alice and Bob Also, a scenario is considered for eavesdropping, as discussed
use 64-QAM constellation points to transmit their induced in Section IV-B, where Eve uses the relay’s observations. Alice
randomness, the received SNR is 23 dB at Alice and Bob and Bob choose their induced randomness from the set of
in (15), the quantization parameter δ is 2, and the number 64-QAM symbols, and set their power levels in such a way
of subcarriers N is 16. Eve is located close to Carol, but that the average received SNRs at the relay from both Alice
at least λ/2 away from her. Given these parameters the and Bob are equal. Then, the amplification vector α is chosen
mutual information Iab,e = I (wab ; we,1 , we,2 ) is numerically such that the average SNR, which is considered in the results,
estimated as Iab,e ≈ 1.39 bits, and the entropy of the generated of Alice and Bob’s correlated observations, (17) and (18),
key bits is numerically estimated as H (qa ) ≈ 3.86 bits. Then, respectively, is the same. The remaining parameters and steps
by Theorem 3, the probability of successful eavesdropping are similar to the previous scenarios.
attack is upper bounded, approximately, by 2−10.57 .
B. Results
V. N UMERICAL R ESULTS 1) Bit Generation Rate: For all the setups described above,
In this section we consider numerical setups with reasonable Alice and Bob exchange their induced randomness over
parameters and evaluate the proposed protocols for the two N = 16 subcarriers, with quantization resolution δ = 2 for
described scenarios, i.e., when a direct channel exists, and the real and imaginary parts separately. Note that 16 × 2 ×
when a relay is used for the key generation, using the metrics 2 = 64 bits are generated by Alice and Bob during each
described in Section II. Also, in order to provide numerical session of the protocol. Hence, the bit generation rate (BGR)

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2702 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020

Fig. 6. The bit mismatch rate (BMR) between Alice’s sequence and Bob’s Fig. 7. The bit error rate (BER) between Alice’s sequence and Bob’s and
and Eve’s sequences versus the signal to noise ratio. Eve’s sequences versus the signal to noise ratio.

the privacy amplification step of the protocol. In addition to


is 64 bits/packet. The length of the final secret key is that, the cumulative distribution function (CDF) of the BER
64/2 = 32 bits. In order to increase Eve’s bit error rate, at Eve’s final key at 20 dB average SNR for both the direct
we assume that four blocks of keys, generated during four and NYUSIM-based SKG setups, and 23 dB average SNR for
separate successful sessions, are added together modulo 2 to the relay-based SKG setup is shown in Figure 8. Note that
obtain one final key of length 32 per each four sessions. Such the curves for all the setups are similar because these curves
BGR is considered high compared to protocols designed for compare the keys which are the addition modulo 2 of four
static channels setups, which have BGR of 14 to 12 bits/packet separate outputs of the hash functions at Alice and Eve. The
as in [25], or 8 bits/packet as in [26], and it is comparable with universal hash function generates a uniformly random output
protocols designed for dynamic environments, such as [14] resulting in the similarity of the curves. Also, it is observed
whose BGR is 60 − 90 bit/packet. that the probability of accepting a mismatched key for the
2) Bit Mismatch Rate and Bit Error Rate: The bit mismatch aforementioned average SNRs in the direct and relay-based
rate (BMR) and bit error rate (BER) between Alice and Bob, SKG setups is around 0.0015%, and for the NYUSIM-based
and Alice and Eve are shown in Figure 6 and Figure 7, respec- SKG setup is around 0.00152%, which are less than 0.00153%
tively, for the three described setups. For the bit mismatch as predicted by Theorem 1. The aforementioned probability is
rate, in the direct and NYUSIM-based SKG setups we com- considered to be very low. In comparison, it is far less than
pare Alice’s and Bob’s quantized sequences of (10) and (11), the probability of generating mismatched keys of the protocol
respectively, and Alice’s and Eve’s quantized sequences proposed for direct SKG in static environments in [28], which
of (10) and (28), respectively. Also, for the relay-based SKG is at least 3%. In addition to that, as discussed in the security
setup, we compare Alice’s and Bob’s quantized sequences of evaluation of the protocol, the probability of acquiring the key
(17) and (18), respectively, and Alice’s and Eve’s quantized perfectly by Eve is, at most, 2−31 and 2−10.57 , for the direct
sequences of (17) and (38), respectively. It is worth noting that and relay-based SKG, respectively. In comparison, the protocol
as the average SNR increases in the NYUSIM-based SKG proposed for direct SKG in static environments in [28] has
setup, Eve’s BMR decreases but the rate of decrease slows the probability of acquiring the key by Eve in the range
down. It can be observed that an increase of around 3 dB of 0.09% − 0.47%.
the average SNR is required in the relay-based SKG setup to 3) Randomness: The randomness of the generated final key
achieve a BMR similar to the first two setups. In comparison sequence is examined using the NIST statistical test suite [43].
with other protocols for static environments at 20 dB, they have The suite consists of 15 tests and generates a probability value,
BMR of around 1% as in [25], 4% as in [26], 4% and 13% also referred to as p-value, for each individual test. For each
for the direct and relay-based setups as in [39]. test, a sequence is considered random with 99% confidence
As for the BER, we compare Alice’s and Bob’s final if the corresponding p-value is greater than 0.01. We run the
key sequences and Alice’s and Eve’s final key sequences. protocol using constant channel coefficients at 20 dB average
It can be observed that the BER at Bob is extremely low SNRs for the direct and NYUSIM-based SKG setups, and
due to the requirement of the consistency checking step in 23 dB average SNR for (17) and (18) in the relay-based SKG
the protocol, which only allows keys whose consistency is setup to generate a sequence of length 220 bits and feed it to
verified with high probability to be accepted. Note that the the test suite. Since the sequences pass all the tests as shown
main reason for the average BER at Eve being around 50% is in Table II, they are considered random with 99% confidence.

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2703

Fig. 8. The cumulative distribution function of the BER at Eve for the direct, Fig. 9. The average number of sessions until key agreement versus the signal
relay-based, and NYUSIM-based SKG setups. The compared sequences are to noise ratio.
the modulo 2 addition of the outputs of four successful key generation
sessions. The universal hash function is supposed to generate a uniformly
random output, hence the similarity of the curves.
of SNR is compared for all three setups. Note that the length
of final secret key is 32, which is obtained by adding modulo 2
TABLE II
the outputs of the protocol in four successful sessions. Hence,
NIST S TATISTICAL T EST R ESULTS
the average number of sessions required to generate a key
approaches 4 as SNR grows large. The number of required
sessions for the relay-based scenario is higher due to a more
severe effect of the noise on the shared randomness. This,
consequently, affects how often Alice and Bob obtain the
same key sequence resulting in a successful session of the
protocol. Figure 9 shows the average number of sessions for
all considered setups.
6) Impact of Non-Reciprocity: The perfect channel reci-
procity feature is assumed to hold throughout the paper;
however, in some practical scenarios, different factors such as
mismatched hardware and synchronization errors may cause
the channel coefficients experienced at Alice and Bob to not
being perfectly reciprocal [14], [18], [51]. Such imperfections
can be taken into account using the Pearson correlation
coefficient, denoted by ζ , between such channel coefficients
explained as follows. In general, under perfect channel reci-
4) Randomness Efficiency: This is computed according procity conditions, we have ζ = 1, while imperfections reduce
to (9). For the direct and NYUSIM-based SKG setups, Alice the value of ζ . As suggested in [51], a model to describe the
and Bob randomly choose induced randomness bit sequences relation between the channel coefficients at a subcarrier during
of length 64, and therefore, H (S) = H (V ) = 64. Note that the session i observed at Alice, i.e.,  h i,ab , and Bob, i.e., h i,ab ,
length of the quantized bit sequence is 64, therefore, R Q = 64. when they observe the same SNR is as follows:
This implies that the randomness efficiency is 50%. On the  σh
other hand, for the relay-based SKG setup, Alice and Bob h i,ab = ζ 
h i,ab + 1 − |ζ |2 √ i n i , (46)
2
separately induce 96 random bits during each round, resulting
in H (S) = H (V ) = 96, while the length of the quantized bit where ζ is the correlation coefficient, σh2i /2 is the dimen-
sequence is R Q = 64. The resulting randomness efficiency sion variance of h i,ab and  h i,ab , and n i denotes the
of the relay-based SKG setup is 33%. Roughly speaking, circularly-symmetric Gaussian-distributed independent noise
the remaining part of the available randomness is used to component with mean 0 and unit dimension variance. In order
provide security. The exact trade-off between randomness to illustrate the effect of imperfect reciprocity in the direct
efficiency and security is an interesting problem. SKG setup, the bit mismatch rate for different values of the
5) Average Number of Sessions Required to Generate Keys: correlation coefficient ζ is shown in Figure 10. It can be
In this part, the average number of sessions Alice and Bob observed that as the correlation coefficient between the channel
need to generate their final secret key given different values coefficients decreases, the BMR between Alice’s and Bob’s

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
2704 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020

of the various steps of the proposed protocols make them


appealing for applications concerning resource-constrained
devices, e.g., IoT networks, where low complexity methods
for generating distributed secret keys are highly desirable.
There are several possible directions for future work. It is
interesting to extend the setups considered in this paper to
multi-user scenarios where multiple users wish to generate
shared secret keys with the help of multiple intermediate
relays. From an information-theoretic perspective, this relates
to the problem of distributed secret sharing in multi-user
scenarios [52]. Also, investigating scenarios where the passive
eavesdropper has further capabilities than what is considered
in this paper, e.g., being able to deploy multiple antennas in
the surrounding environment, is another interesting direction.
Moreover, studying the resilience of the proposed protocols
in the presence of an active eavesdropper who can act as a
jammer with the aim of partially crippling the key generation
process by sending intentional interference during the random-
Fig. 10. The bit mismatch rate (BMR) in the direct SKG setup between
Alice’s and Bob’s sequences versus the signal to noise ratio for differ-
ness exchange is another interesting direction for future work.
ent values of the correlation coefficient ζ of the channels experienced at
Alice and Bob.
R EFERENCES
[1] N. Aldaghri and H. Mahdavifar, “Fast secret key generation in static
quantized sequences increases causing the protocol to expe- environments using induced randomness,” in Proc. IEEE Global Com-
rience higher number of unsuccessful sessions. For instance, mun. Conf. (GLOBECOM), Dec. 2018, pp. 1–6.
to achieve a BMR around 22%, the required SNR is 9 dB for [2] N. F. Pub, “197: Advanced encryption standard (AES),” Federal Inf.
Process. Standards, vol. 197, no. 441, p. 0311, 2001.
ζ = 1, whereas it is 15 dB for ζ = 0.9. On the other hand, [3] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital
when comparing the average number of sessions required to signatures and public-key cryptosystems,” Commun. ACM, vol. 26, no. 1,
agree on a key at 15 dB, it is around 9 sessions for ζ = 1, pp. 96–99, Jan. 1983.
[4] J. Granjal, E. Monteiro, and J. Sa Silva, “Security for the Internet of
while it is around 37 sessions for ζ = 0.9. Depending on the things: A survey of existing protocols and open research issues,” IEEE
severity of the imperfections, the protocol’s parameters would Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294–1312, 3rd Quart., 2015.
require certain adjustments to overcome such degradation. For [5] M. Bloch and J. Barros, Physical-Layer Security: From Information
Theory to Security Engineering. Cambridge, U.K.: Cambridge Univ.
example, the legitimate parties can decrease the bit generation Press, 2011.
rate by using a lower quantization resolution δ, or decrease the [6] R. Ahlswede and I. Csiszar, “Common randomness in information theory
rate of the error-correcting code used for reconciliation which and cryptography. I. secret sharing,” IEEE Trans. Inf. Theory, vol. 39,
results in an increase of the amount of information leaked to no. 4, pp. 1121–1132, Jul. 1993.
[7] U. M. Maurer, “Secret key agreement by public discussion from common
the eavesdropper. information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742,
May 1993.
[8] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, “Radio-
VI. C ONCLUSION telepathy: Extracting a secret key from an unauthenticated wireless
In this paper, we propose a new low-complexity approach to channel,” in Proc. 14th ACM Int. Conf. Mobile Comput. Netw., 2008,
pp. 128–139.
generate secret keys in static environments at high rates using [9] J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key generation
induced randomness. We utilize a low-complexity method from wireless channels: A review,” IEEE Access, vol. 4, pp. 614–626,
where legitimate parties induce locally-generated randomness 2016.
[10] R. Wilson, D. Tse, and R. A. Scholtz, “Channel identification: Secret
into the channel such that high-rate common randomness can sharing using reciprocity in ultrawideband channels,” IEEE Trans. Inf.
be generated. More specifically, two main scenarios are con- Forensics Security, vol. 2, no. 3, pp. 364–375, Sep. 2007.
sidered for the proposed protocols taking into account whether [11] K. Ren, H. Su, and Q. Wang, “Secret key generation exploiting channel
a direct wireless channel is available between legitimate parties characteristics in wireless communications,” IEEE Wireless Commun.,
vol. 18, no. 4, pp. 6–12, Aug. 2011.
or no such channel is available and the transmissions occur [12] A. F. Molisch, Wireless Communications, vol. 34. Hoboken, NJ, USA:
through an intermediate relay. We evaluate the reliability Wiley, 2012.
and security of the proposed protocols using information [13] S. N. Premnath et al., “Secret key extraction from wireless signal
strength in real environments,” IEEE Trans. Mobile Comput., vol. 12,
theoretic measures. The protocols are also evaluated using no. 5, pp. 917–930, May 2013.
metrics including BGR, BMR, BER, and the newly introduced [14] H. Liu, Y. Wang, J. Yang, and Y. Chen, “Fast and practical secret
randomness efficiency. Furthermore, numerical results are also key extraction by exploiting channel response,” in Proc. Proc. IEEE
INFOCOM, Apr. 2013, pp. 3048–3056.
shown for a realistic 5G mmWave setup, where channel [15] W. Xi et al., “KEEP: Fast secret key extraction protocol for D2D
coefficients are generated by the measurement-based NYUSIM communication,” in Proc. IEEE 22nd Int. Symp. Qual. Service (IWQoS),
Channel Simulator [44]. To ensure that the keys generated May 2014, pp. 350–359.
[16] Y. Liu, S. C. Draper, and A. M. Sayeed, “Exploiting channel diversity in
by this protocol are random, the generated keys are tested secret key generation from multipath fading randomness,” IEEE Trans.
using the NIST statistical test suite. The low-complexity nature Inf. Forensics Security, vol. 7, no. 5, pp. 1484–1497, Oct. 2012.

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.
ALDAGHRI AND MAHDAVIFAR: PHYSICAL LAYER SKG IN STATIC ENVIRONMENTS 2705

[17] J. Zhang, A. Marshall, R. Woods, and T. Q. Duong, “Secure key [41] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proc.
generation from OFDM subcarriers’ channel responses,” in Proc. IEEE 6th ACM Conf. Comput. Commun. Secur. (CCS), 1999, pp. 28–36.
Globecom Workshops (GC Wkshps), Dec. 2014, pp. 1302–1307. [42] T. H. Cormen, Introduction to Algorithms. Cambridge, MA, USA: MIT
[18] K. Zeng, “Physical layer key generation in wireless networks: Chal- Press, 2009.
lenges and opportunities,” IEEE Commun. Mag., vol. 53, no. 6, [43] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, “A statistical
pp. 33–39, Jun. 2015. test suite for random and pseudorandom number generators for cryp-
[19] M. Zorgui, Z. Rezki, B. Alomair, E. A. Jorswieck, and M.-S. Alouini, tographic applications,” Booz-Allen and Hamilton Inc., McLean, VA,
“On the ergodic secret-key agreement over spatially correlated multiple- USA, Special Publication 800-22, 2001.
antenna channels with public discussion,” IEEE Trans. Signal Process., [44] S. Sun, G. R. MacCartney, and T. S. Rappaport, “A novel millimeter-
vol. 64, no. 2, pp. 495–510, Jan. 2016. wave channel simulator and applications for 5G wireless communica-
[20] E. A. Jorswieck, A. Wolf, and S. Engelmann, “Secret key generation tions,” in Proc. IEEE Int. Conf. Commun. (ICC), May 2017, pp. 1–7.
from reciprocal spatially correlated MIMO channels,” in Proc. IEEE [45] M. O. Hasna and M.-S. Alouini, “End-to-end performance of transmis-
Globecom Workshops (GC Wkshps), Dec. 2013, pp. 1245–1250. sion systems with relays over Rayleigh-fading channels,” IEEE Trans.
[21] L. Jiao, N. Wang, and K. Zeng, “Secret beam: Robust secret key Wireless Commun., vol. 2, no. 6, pp. 1126–1131, Nov. 2003.
agreement for mmWave massive MIMO 5G communication,” in Proc. [46] A. J. Viterbi, “Error bounds for convolutional codes and an asymptoti-
IEEE Global Commun. Conf. (GLOBECOM), Dec. 2018, pp. 1–6. cally optimum decoding algorithm,” IEEE Trans. Inf. Theory, vol. IT-13,
[22] M. G. Madiseh, S. W. Neville, and M. L. McGuire, “Applying no. 2, pp. 260–269, Apr. 1967.
beamforming to address temporal correlation in wireless channel [47] Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate
characterization-based secret key generation,” IEEE Trans. Inf. Forensics strong keys from biometrics and other noisy data,” in Proc. Int. Conf.
Security, vol. 7, no. 4, pp. 1278–1287, Aug. 2012. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer, 2004,
pp. 523–540.
[23] S. Gollakota and D. Katabi, “Physical layer wireless security made
[48] S. Goldwasser and S. Micali, “Probabilistic encryption,” J. Comput. Syst.
fast and channel independent,” in Proc. IEEE INFOCOM, Apr. 2011,
Sci., vol. 28, no. 2, pp. 270–299, Apr. 1984.
pp. 1125–1133.
[49] M. Bellare, S. Tessaro, and A. Vardy, “Semantic security for the wiretap
[24] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE channel,” in Advances Cryptology. Berlin, Germany: Springer, 2012,
Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008. pp. 294–311.
[25] Q. Wang, H. Su, K. Ren, and K. Kim, “Fast and scalable secret key [50] T. M. Cover and J. A. Thomas, Elements of Information Theory.
generation exploiting channel phase randomness in wireless networks,” Hoboken, NJ, USA: Wiley, 2012.
in Proc. IEEE INFOCOM, Apr. 2011, pp. 1422–1430. [51] S. Primak, K. Liu, and X. Wang, “Secret key generation using physical
[26] P. Huang and X. Wang, “Fast secret key generation in static wireless channels with imperfect CSI,” in Proc. IEEE 80th Veh. Technol. Conf.
networks: A virtual channel approach,” in Proc. IEEE INFOCOM, (VTC-Fall), Sep. 2014, pp. 1–5.
Apr. 2013, pp. 2292–2300. [52] M. Soleymani and H. Mahdavifar, “Distributed multi-user secret
[27] G. Li, A. Hu, J. Zhang, and B. Xiao, “Security analysis of a novel sharing,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2018,
artificial randomness approach for fast key generation,” in Proc. IEEE pp. 1141–1145.
Global Commun. Conf., Dec. 2017, pp. 1–6.
[28] S. Fang, I. Markwood, and Y. Liu, “Manipulatable wireless key estab-
lishment,” in Proc. IEEE Conf. Commun. Netw. Secur. (CNS), Oct. 2017,
pp. 1–9.
[29] B. Sunar, W. Martin, and D. Stinson, “A provably secure true random
number generator with built-in tolerance to active attacks,” IEEE Trans.
Comput., vol. 56, no. 1, pp. 109–119, Jan. 2007.
[30] N. Ebrahimi, H. Mahdavifar, and E. Afshari, “A novel approach to secure Nasser Aldaghri (Student Member, IEEE) received
communication in physical layer via coupled dynamical systems,” in the B.S. degree in electrical engineering from King
Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2018, pp. 1–7. Saud University, Riyadh, Saudi Arabia, in 2014, and
[31] H. Mahdavifar and N. Ebrahimi, “Secret key generation via pulse- the M.S. degree in electrical and computer engineer-
coupled synchronization,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), ing from the University of Michigan, Ann Arbor, MI,
Jul. 2019, pp. 3037–3041. USA, in 2017, where he is currently pursuing the
[32] N. Ebrahimi, B. Yektakhah, K. Sarabandi, H. S. Kim, D. Wentzloff, and Ph.D. degree. His research interests include infor-
D. Blaauw, “A novel physical layer security technique using master- mation theoretic security, physical layer security, and
slave full duplex communication,” in IEEE MTT-S Int. Microw. Symp. coding theory.
Dig., Jun. 2019, pp. 1096–1099.
[33] L. Lai, Y. Liang, and W. Du, “Cooperative key generation in wireless
networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 8, pp. 1578–1588,
Sep. 2012.
[34] Q. Wang, K. Xu, and K. Ren, “Cooperative secret key generation from
phase estimation in narrowband fading channels,” IEEE J. Sel. Areas
Commun., vol. 30, no. 9, pp. 1666–1674, Oct. 2012.
[35] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Improving wireless
physical layer security via cooperating relays,” IEEE Trans. Signal Hessam Mahdavifar (Member, IEEE) received the
Process., vol. 58, no. 3, pp. 1875–1888, Mar. 2010. B.Sc. degree from the Sharif University of Tech-
[36] T. Shimizu, H. Iwai, and H. Sasaoka, “Physical-layer secret key agree- nology, Tehran, Iran, in 2007, and the M.Sc. and
ment in two-way wireless relaying systems,” IEEE Trans. Inf. Forensics Ph.D. degrees from the University of California San
Security, vol. 6, no. 3, pp. 650–660, Sep. 2011. Diego (UCSD), La Jolla, in 2009 and 2012, respec-
[37] H. Zhou, L. M. Huie, and L. Lai, “Secret key generation in the two-way tively, all in electrical engineering. He was a Staff
relay channel with active attackers,” IEEE Trans. Inf. Forensics Security, Research Engineer with the Samsung U.S. Research
vol. 9, no. 3, pp. 476–488, Mar. 2014. and Development, San Diego, USA, from 2012 to
[38] R. Zhang, L. Song, Z. Han, and B. Jiao, “Physical layer security for 2016. He is currently an Assistant Professor with the
two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Department of Electrical Engineering and Computer
Technol., vol. 61, no. 8, pp. 3693–3704, Oct. 2012. Science, University of Michigan, Ann Arbor. His
[39] R. Guillaume, S. Ludwig, A. Muller, and A. Czylwik, “Secret key main area of research is coding and information theory with applications
generation from static channels with untrusted relays,” in Proc. IEEE to wireless communications, storage systems, security, and privacy.
11th Int. Conf. Wireless Mobile Comput., Netw. Commun.(WiMob), Dr. Mahdavifar received the NSF career award in 2020. He also received
Oct. 2015, pp. 635–642. the Best Paper Award in 2015 IEEE International Conference on RFID and
[40] C. D. T. Thai, J. Lee, and T. Q. S. Quek, “Physical-layer secret the 2013 Samsung Best Paper Award. He also received two Silver Medals at
key generation with colluding untrusted relays,” IEEE Trans. Wireless International Mathematical Olympiad in 2002 and 2003, and two Gold Medals
Commun., vol. 15, no. 2, pp. 1517–1530, Feb. 2016. at Iran National Mathematical Olympiad in 2001 and 2002.

Authorized licensed use limited to: University of Exeter. Downloaded on May 07,2020 at 14:38:13 UTC from IEEE Xplore. Restrictions apply.

You might also like