Physical-layer based key generation schemes exploit the channel reciprocity for secret key extraction, which can achieve information-theoretic secrecy against eavesdroppers. Such methods, although practical, have been shown to be vulnerable against man-in-the-middle (MitM) attacks, where an active adversary, Mallory, can influence and infer part of the secret key generated between Alice and Bob by injecting her own packet upon observing highly correlated channel/RSS measurements from Alice and Bob. As all the channels remain stable within the channel coherence time, Mallory's injected packets cause Alice and Bob to measure similar RSS, which allows Mallory to successfully predict the derived key bits. To defend against such a MitM attack, we propose to utilize a reconfigurable antenna at one of the legitimate transceivers to proactively randomize the channel state across different channel probing rounds. The randomization of the antenna mode at every probing round breaks the temporal correlation of the channels from the adversary to the legitimate devices, while preserving the reciprocity of the channel between the latter. This prevents key injection from the adversary without affecting Alice and Bob's ability to measure common randomness. We theoretically analyze the security of the protocol and conduct extensive simulations and real-world experiments to evaluate its performance. Our results show that our approach eliminates the advantage of an active MitM attack by driving down the probability of successfully guessing bits of the secret key to a random guess.
翻译:以物理为主的关键发电计划利用频道对等性进行秘密关键提取,这可以实现对窃听者的信息理论保密。这些方法虽然实际可行,但已被证明在中间人(MitM)袭击面前很脆弱,因为活跃的对手Mallory能够影响和推断爱丽丝和鲍勃之间产生的秘密密钥的一部分,通过观察与爱丽丝和鲍勃的高度关联的频道/RSS测量数据,将爱丽丝和鲍勃之间的部分秘密密钥注射给爱丽丝和鲍勃。随着所有渠道在频道一致性时间里保持稳定,马洛里所注射的包使爱丽丝和鲍勃能够测量类似的RSS,从而使得马洛里能够成功预测衍生的关键部分。为了防范MitM(M)袭击,我们提议在合法的传输器中,利用一个可重新配置的天线,以便在不同的频道测试回合里,对频道状态进行主动随机随机随机调整。每轮回的天线模式打破了从对手到合法装置之间的时间相关性,同时保持了后方通道之间的对等关系。这样可以防止敌人进行关键注射,而不会影响爱丽丝和鲍伯(B)的精确地分析我们的安全性模拟模式的常规实验结果。