-
Let's shake on it: Extracting secure shared keys from Wi-Fi CSI
Authors:
Tomer Avrahami,
Ofer Amrani,
Avishai Wool
Abstract:
A shared secret key is necessary for encrypted communications. Since Wi-Fi relies on OFDM, we suggest a method to generate such a key by utilizing Wi-Fi's channel state information (CSI). CSI is typically reciprocal but very sensitive to location: While the legitimate Alice and Bob observe the same CSI, an eavesdropper Eve observes an uncorrelated CSI when positioned over 0.5 wavelength away. We s…
▽ More
A shared secret key is necessary for encrypted communications. Since Wi-Fi relies on OFDM, we suggest a method to generate such a key by utilizing Wi-Fi's channel state information (CSI). CSI is typically reciprocal but very sensitive to location: While the legitimate Alice and Bob observe the same CSI, an eavesdropper Eve observes an uncorrelated CSI when positioned over 0.5 wavelength away. We show that if endpoint Bob is shaken, sufficient diversity is induced in the CSI so that it can serve as a source of true randomness. Then we show that the CSI among neighboring sub-carriers is correlated, so we select a small set of judiciously-spaced sub-carriers, and use a majority rule around each. We demonstrate that Alice and Bob observe a 5-15\% bit mismatch rate (BMR) in the extracted bitstream while Eve observes a BMR of around 50\% even when placed within 10cm of Alice. We employ the cryptography-oriented definition of min-entropy to estimate the number of secure bits within the bitstream, and use the Cascade algorithm of quantum-key-distribution to reconcile Alice and Bob's bitstreams, while quantifying the number of bits leaked by the algorithm. Accounting for both the min-entropy and the cascade leakage we quantify the Secured Bit Generation Rate of our method.
We conducted extensive tests in an indoor environment. Our system exhibits a secure bit generation rate of 1.2--1.6 %secure bits per packet, at distances ranging from 0.5m--9m, and can generate a secure shared 128-bit key with 20sec of device shaking.
△ Less
Submitted 11 July, 2023;
originally announced July 2023.
-
Sub-Rate Linear Network Coding
Authors:
Ben Grinboim,
Itay Shrem,
Ofer Amrani
Abstract:
Increasing network utilization is often considered as the holy grail of communications. In this article, the concept of sub-rate coding and decoding in the framework of linear network coding (LNC) is discussed for single-source multiple-sinks finite acyclic networks. Sub-rate coding offers an add-on to existing LNC. It allows sinks whose max-flow is smaller than the source message-rate, termed \em…
▽ More
Increasing network utilization is often considered as the holy grail of communications. In this article, the concept of sub-rate coding and decoding in the framework of linear network coding (LNC) is discussed for single-source multiple-sinks finite acyclic networks. Sub-rate coding offers an add-on to existing LNC. It allows sinks whose max-flow is smaller than the source message-rate, termed \emph{sub-rate sinks}, to decode a portion of the transmitted message without degrading the maximum achievable rate of LNC sinks whose max-flow is equal (or greater) than the rate of the source node. The article studies theoretical aspects of sub-rate coding by formulating the conditions a node (and indeed the network) must fulfill so as to qualify as a legitimate sub-rate sink.
△ Less
Submitted 26 May, 2022;
originally announced May 2022.
-
Dynamic Network-Code Design for Satellite Networks
Authors:
Itay Shrem,
Ben Grinboim,
OFer Amrani
Abstract:
Internet access from space enjoys renaissance as satellites in Mega-Constellations is no longer fictitious. Network capacity, subject to power and computational complexity constraints among other challenges, is a major goal in this type of networks. This work studies Network Coding in the presence of dynamically changing network conditions. The notion of generalized acyclic network is introduced a…
▽ More
Internet access from space enjoys renaissance as satellites in Mega-Constellations is no longer fictitious. Network capacity, subject to power and computational complexity constraints among other challenges, is a major goal in this type of networks. This work studies Network Coding in the presence of dynamically changing network conditions. The notion of generalized acyclic network is introduced and employed for promoting the generation of linear-multicast network code for what is considered to be a cyclic network. The performance of several network coding schemes, among these is the known static network code, is evaluated by a STK simulation for a swarm of communicating satellites, conceptually based on the Iridium system. Exploiting the prior knowledge of the networks topology over time, new network coding approaches are described, whose aim is to better cope with the time-varying, dynamic behavior of the network. It is demonstrated that in all cases, pertaining to our example network, static network codes under-perform compared to the presented approach. In addition, an efficient test for identifying the most appropriate coding approach is presented.
△ Less
Submitted 4 April, 2022;
originally announced April 2022.
-
Graph-based Detection of Multiuser Impulse Radio Systems
Authors:
Y. Shen Bachar,
O. Amrani
Abstract:
Impulse-Radio (IR) is a wideband modulation technique that can support multiple users by employing random Time-Hopping (TH) combined with repeated transmissions. The latter is aimed at alleviating the impact of collisions. This work employs a graphical model for describing the multiuser system which, in turn, facilitates the inclusion of general coding schemes. Based on factor graph representation…
▽ More
Impulse-Radio (IR) is a wideband modulation technique that can support multiple users by employing random Time-Hopping (TH) combined with repeated transmissions. The latter is aimed at alleviating the impact of collisions. This work employs a graphical model for describing the multiuser system which, in turn, facilitates the inclusion of general coding schemes. Based on factor graph representation of the system, several iterative multiuser detectors are presented. These detectors are applicable for any binary linear coding scheme. The performance of the proposed multiuser detectors is evaluated via simulations revealing large gains with low complexity.
△ Less
Submitted 23 May, 2021;
originally announced May 2021.