Abstract
The unpredictability of the wireless channel has been used as a natural source of randomness to build physical-layer security primitives for shared key generation, authentication, access control, proximity verification, and other security properties. Compared to pseudo-random generators, it has the potential to achieve information-theoretic security. In sub-6 GHz frequencies, the randomness is harvested from the small-scale fading effects of RF signal propagation in rich scattering environments. However, the RF propagation characteristics follow sparse models with clustered paths when devices operate in millimeter-wave (mmWave) bands (5G and Next-Generation networks, Wi-Fi in 60GHz). Millimeter-wave transmissions are typically directional to increase the gain and combat high signal attenuation, leading to stable and more predictable channels. In this paper, we first demonstrate that state-of-the-art methods relying on channel state information or received signal strength measurements fail to produce high randomness. Accounting for the unique features of mmWave propagation, we propose a novel randomness extraction mechanism that exploits the random timing of channel blockage to harvest random bits. Compared with the prior art in CSI-based and context-based randomness extraction, our protocol remains secure against passive and active Man-in-the-Middle adversaries co-located with the legitimate devices. We demonstrate the security properties of our method in a 28 GHz mmWave testbed in an indoor setting.
Original language | English (US) |
---|---|
Pages (from-to) | 2285-2300 |
Number of pages | 16 |
Journal | IEEE Transactions on Mobile Computing |
Volume | 24 |
Issue number | 3 |
DOIs | |
State | Published - 2025 |
Keywords
- Randomness extraction
- mmWave communications
- physical-layer security
- secure device bootstrapping
ASJC Scopus subject areas
- Software
- Computer Networks and Communications
- Electrical and Electronic Engineering