Channel Model and Sounding Method Effects on Wireless Secret Key Rates Brett T. Walkenhorst, Andrew D. Harper, Robert J. Baxley Georgia Tech Research Institute Georgia Institute of Technology Atlanta, GA 30332 brett@gatech.edu; andrewharper@gatech.edu; baxley@gatech.edu Abstract—Ensuring data privacy of wireless communication systems has been a challenging problem for various reasons. The simplicity of eavesdropping on wireless transmissions makes the barrier to entry lower for wireless than for wired systems. Due to size and power constraints, wireless systems are sometimes unable to implement the complex cryptographic algorithms that can ensure the privacy of their data, leaving them with weaker schemes that are more easily exploited. However, the wireless security problem has one distinct advantage over the wired problem in that the channel seen by the eavesdropper is not usually correlated with the channel seen by the intended receiver. Recent research in the community has suggested that the randomness inherent in the wireless channel may be exploited to create secret keys dynamically, making simple wireless cryptographic schemes extremely strong and in some applications providing perfect secrecy. In this paper, we present some information theory bounds on key lengths for various wireless channel models and discuss the impact such physical channel- derived dynamic re-keying would have on various applications. We also present some thoughts on proving out the concepts in actual systems. Keywords: secrecy capacity, cryptography, wireless secrecy I. INTRODUCTION Recent studies have demonstrated the ability of a transmitter/receiver pair (Alice/Bob) to generate secret keys derived from the physical layer channel [1]-[9]. By creating keys in real-time, perfect secrecy (information-theoretically secure) and/or near-perfect secrecy (computationally secure) can be established with a pair of low-cost transceivers. Initial studies demonstrated the potential for secret communication leveraging differences in the Alice-Bob channel and the Alice- Eve channel using Information Theory [1]-[2]. For simplicity in proving the concepts, many of these early studies assumed a binary symmetric channel with fixed probabilities. More recent papers have investigated key lengths and key rates available in a Jakes’ model, which is applicable to a fixed- to-mobile wireless channel model [3] and Rayleigh/Rician fading channels [4]. The work of [3] concluded that the optimal strategy for a given number of channel samples is one that minimizes the channel sounding time. In this paper, we generalize their approach in three significant ways and thereby generate slightly different conclusions. First, we examine the effects of system delays on the number of key bits generated as well as the channel sounding strategies employed. Second, we incorporate correlation effects for arbitrarily long time periods rather than assuming zero correlation outside the coherence interval. Third, we explore the effects of differing correlation functions on the key generation rates available. Specifically, we consider three distinct channel models (Jakes, Gaussian, and Sinc) using two basic methods of sounding the channel (simultaneous sounding and time division duplex (TDD) with/without delay). Channel sounding is the process of transmitting a known sequence from one node so the other node can estimate the channel response. The results of our analysis demonstrate secret key generation rates available for some of these combinations and draw conclusions about the available secret rates relative to non-secret rates in typical wireless channels. We will conclude with some discussion of implementation of this key generation in hardware systems. This paper is outlined as follows. In Section II, we briefly introduce the information theory construct for computing key lengths; section III discusses sounding strategies; and section IV describes the channel models we employ. Simulation results are given in Section V with discussion of results in Section VI and conclusions in VII. II. SECRET KEY LENGTHS In the wireless eavesdropping channel, we assume that Alice, the intended transmitter, is attempting to communicate with Bob, while a third party, Eve, is attempting to eavesdrop. The signal that Bob sees when Alice transmits is given by    (1) the signal Alice sees when Bob transmits is given by    (2) and the signal Eve sees when Alice transmits is given by    (3) Although Eve may be interested in Bob’s transmissions, the problem is symmetric and it is sufficient to analyze Eve’s ability to correctly decode Alice’s transmissions. In our system model, we introduce the possibility that Bob transmits to enable both Alice and Bob to estimate their channel so they can agree upon a key. The system model described above is depicted graphically in Figure 1. We assume that    at any given time. While this assumption may be skewed somewhat by variations in the 978-1-4673-2709-1/12/$31.00 ©2012 IEEE 597