The present invention relates to a system for encryption and authentication in digital communications, and, more particularly, to a system for encryption and authentication utilizing unique characteristics of a communications channel.
Since the pioneering of wireless data transmission more than a century ago, exhaustive research has been focused on improving the capacity of the wireless channel while maintaining robustness. Various modulation schemes and advances in RF design address these issues at the physical layer, yet the security aspect of the wireless network is usually left as an afterthought, to be handled at higher layers with cryptography.
When considering the security of a wireless network, the two major issues that must be considered are access control and privacy assurance. Access is restricted to authorized users by the use of various authentication mechanisms that verify the user's identity. Privacy of the data communicated in the network is protected by cryptography. Although these two aspects of security can be examined independently from each other, vulnerability in one of the two security mechanisms will almost definitely expose the other.
Authentication mechanisms depend on some form of handshaking between the client and a server, transferring sensitive information over the open channel. Interception of such information would allow a rogue client to gain access to the network, and, therefore, intricate mechanisms must ensure the privacy of the handshake, often allowing for security holes. Cryptographic mechanisms are based on a key that will allow encryption and decryption of data at the two ends of the channel. This key can be preordained or distributed upon connection. Both options have vulnerabilities that can be exploited.
The present invention overcomes the disadvantages and shortcomings discussed above by providing a system that offers a number of advantages over the prior art. For example, although the aforestated security problems exist in any network, wired or wireless, mobility, an attribute inherently associated with wireless networks, requires that the communications channel is available in the entire covered area, making it easier for an unauthorized client to monitor communications or impersonate an authorized user. There is however a feature of a wireless channel that may be used as a security advantage. The characteristics of the communications channel have unique features that can only be determined by the two ends of the channel.
Experimental data has indicated that the characteristics of the channel are dynamic enough spatially to be used to differentiate between users that are close to each other, while at the same time static enough temporally to ensure the same key can be generated with one or multiple packet exchanges. Generating an encryption key on-the-fly at both ends independently significantly reduces overhead and risk associated with current key distribution techniques.
This novel process for generating encryption keys eliminates dissemination overhead and security risks of pre-shared keys. Furthermore, it significantly simplifies point-to-point encryption for complex topology networks, providing “low cost” security to emerging adhoc networks (vehicular, sensor, military). It provides transparent security for Local Area Network (LAN) and Personal Area Network (PAN) applications, and is an ideal security solution for emerging Ultra-Wide Band (UWB) systems. United States Department of Defense (DOD) applications can benefit from uncorrelated fast re-keying that can be achieved in fast changing environments for provably secure communications with no cost re-keying. Finally, the process facilitates innovative access control mechanisms based on Transmit-Receive signatures, as well as intrusion detection capabilities.
More particularly, the present invention provides a method for encryption/decryption and authentication during forward and reverse path communications for data between a transmitter frontend and a receiver frontend on a link between a first transceiver and a second transceiver. The method comprises the steps of determining a channel response having independent information bits for the link; and determining a propagation signature from the independent information bits extracted from the channel response, whereby the propagation signature is used as a symmetric key with which the data is encrypted/decrypted. The method also comprises the steps of determining a transmit-receive frequency response having independent information bits for the forward path communications for the transmitter and receiver frontends, and determining a transmitter-receiver signature from the independent information bits extracted from said transmit-receiver frequency response for the forward path communications, whereby the transmitter-receiver signature is used by the receiver as an authentication mask for identifying the transmitter together with the propagation signature. Likewise, the method also comprises the steps of determining a transmit-receive frequency response having independent information bits for the reverse path communications for the transmitter and receiver frontends; and determining a transmitter-receiver signature from the independent information bits extracted from the transmit-receiver frequency response for the reverse path communications, whereby the transmitter-receiver signature is used by the receiver as an authentication mask for identifying the transmitter together with said propagation signature.
For a more complete understanding of the present invention, reference is made to the following detailed description of an exemplary embodiment considered in conjunction with the accompanying drawings, in which:
a-5d are graphs displaying experimental results of propagation signature extraction and information bits achievable from measurements in an indoor environment across varying locations; and
a-6e are graphs displaying experimental results of transmitter-receiver signature extraction and information bits achievable from measurements across multiple different transmitter-receiver pairs for a particular manufacturer.
Encryption is commonly employed in digital communication systems in order to secure the privacy of the information flow. Authentication serves the purpose of establishing the identity of the communicating nodes within the context of access control, auditing and non-repudiation. The two processes are commonly based on one or more shared secrets between the two communicating nodes. Symmetric cryptographic schemes require a shared secret to be disseminated through a secure information channel prior to its use. The present invention provides a novel method of generating the common secret at the two ends of a communication link without prior dissemination. Furthermore the invention provides a method to maintain the authenticity of the communicating entities over time based on the unique non-idealities of the transceivers in conjunction with the propagation characteristics of the link.
The encryption keys are generated during the communication process at both ends of the link L (i.e., the transceiver A (Trx_A) and the transceiver B (Trx_B pair)) without any a-priori knowledge. More particularly, the process utilizes the unique characteristics of the channel L (i.e., a channel response) between the transceiver A (Trx_A) and the transceiver B (Trx_B) as a common secret measurable only between the communicating nodes, to generate the encryption keys that are used by conventional cryptographic mechanisms. The channel response is a complex product of the various propagation phenomena that contribute to the received signal power. The estimation of the channel response, the multipath profile, the frequency selective fading etc., provides statistical information that is common for the two ends of the channel but unknown to everybody else. For example, the frequency response measured across the communications link L represents a convolution of the propagation channel and the transceiver impairments. Both features represent unique characteristics identifying a specific transceiver at a specific location. The convolved features are separated into Transmit-Receive and Propagation Signatures that can be used as a shared secret across the link for encryption and authentication. Such signatures rely on the joint information across the transmitter-receiver pair and are not stationary, rendering estimation and spoofing difficult. Channel estimation (i.e., the estimation of the deterministic relationship between the transmitted and the received signal), currently used in many communication systems, is used to define these characteristics periodically or on a per packet basis
Referring to
The algorithms used in the process are described hereinbelow. More particularly, the algorithms used in the creation of a symmetric key (SIG) are described in relation to
Referring to
The key negotiation method is illustrated in
a-5d and 6a-6e display experimental results derived from the use of a prototype to generate and analyze signatures towards the goal of determining the key-space achievable in a real world environment.
It will be understood that the embodiment described herein is merely exemplary and that a person skilled in the art may make many variations and modifications without departing from the spirit and scope of the invention. For instance, all such variations and modifications are intended to be included within the scope of the invention.
The present application claims the benefit of U.S. Provisional Patent Application Ser. No. 61/109,677, filed on Oct. 30, 2008, the disclosure of which is incorporated herein by reference in its entirety.
Some of the research performed in the development of the disclosed subject matter was supported by U.S. government Grant Nos. W15QkN-05-D-0011/FA8240-07-R-0035. The U.S. government may have certain rights with respect to this application.
Number | Date | Country | |
---|---|---|---|
61109677 | Oct 2008 | US |