TY - JOUR
T1 - How to Test the Randomness from the Wireless Channel for Security?
AU - Qu, Zhe
AU - Zhao, Shangqing
AU - Xu, Jie
AU - Lu, Zhuo
AU - Liu, Yao
N1 - Funding Information:
Manuscript received December 5, 2020; revised April 4, 2021 and May 4, 2021; accepted June 14, 2021. Date of publication June 28, 2021; date of current version July 28, 2021. This work was supported in part by NSF through University of South Florida (USF) under Grant 1553304, Grant 1717969, and Grant 2029875. The work of Jie Xu was supported in part by NSF under Grant ECCS-2029858. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Ragnar Thobaben. (Corresponding author: Zhe Qu.) Zhe Qu, Shangqing Zhao, and Zhuo Lu are with the Department of Electrical Engineering, University of South Florida, Tampa, FL 33620 USA (e-mail: zhequ@usf.edu; shangqing@usf.edu; zhuolu@usf.edu).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2021
Y1 - 2021
N2 - We revisit the traditional framework of wireless secret key generation, where two parties leverage the wireless channel randomness to establish a secret key. The essence in the framework is to quantify channel randomness into bit sequences for key generation. Conducting randomness tests on such bit sequences has been a common practice to provide the confidence to validate whether they are random. Interestingly, despite different settings in the tests, existing studies interpret the results the same: passing tests means that the bit sequences are indeed random. In this paper, we investigate how to properly test the wireless channel randomness to ensure enough security strength and key generation efficiency. In particular, we define an adversary model that leverages the imperfect randomness of the wireless channel to search the generated key, and create a guideline to set up randomness testing and privacy amplification to eliminate security loss and achieve efficient key generation rate. We use theoretical analysis and comprehensive experiments to reveal that common practice misuses randomness testing and privacy amplification: (i) no security insurance of key strength, (ii) low efficiency of key generation rate. After revision by our guideline, security loss can be eliminated and key generation rate can be increased significantly.
AB - We revisit the traditional framework of wireless secret key generation, where two parties leverage the wireless channel randomness to establish a secret key. The essence in the framework is to quantify channel randomness into bit sequences for key generation. Conducting randomness tests on such bit sequences has been a common practice to provide the confidence to validate whether they are random. Interestingly, despite different settings in the tests, existing studies interpret the results the same: passing tests means that the bit sequences are indeed random. In this paper, we investigate how to properly test the wireless channel randomness to ensure enough security strength and key generation efficiency. In particular, we define an adversary model that leverages the imperfect randomness of the wireless channel to search the generated key, and create a guideline to set up randomness testing and privacy amplification to eliminate security loss and achieve efficient key generation rate. We use theoretical analysis and comprehensive experiments to reveal that common practice misuses randomness testing and privacy amplification: (i) no security insurance of key strength, (ii) low efficiency of key generation rate. After revision by our guideline, security loss can be eliminated and key generation rate can be increased significantly.
KW - Maximum likelihood tree search
KW - Randomness test
KW - Security
KW - Wireless key generation
UR - http://www.scopus.com/inward/record.url?scp=85111593299&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85111593299&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2021.3092051
DO - 10.1109/TIFS.2021.3092051
M3 - Article
AN - SCOPUS:85111593299
VL - 16
SP - 3753
EP - 3766
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
SN - 1556-6013
M1 - 9466142
ER -