Performance Evaluation of Meteor Key Distribution

Amir I. Sulimov, Arkadiy V. Karpov

2015

Abstract

The Wireless Key Distribution is a fast growing area of applied cryptography covering different approaches of secure distribution of secret encryption key based on channel stochastic properties in specific radio communication systems. To be applicable in key distribution purposes the radio channel must meet the three basic requirements: randomness, reciprocity and spatial selectivity. For a long time it was believed that only the fading channels in multipath environment could satisfy all the three requirements. However, several studies also considered a meteor burst channel as a potential candidate for the secure key distribution at distances up to 2000 km. Unfortunately, a rigorous analysis of meteor radio propagation processes shows that the channel has only approximate reciprocity. This may result in the two legitimate nodes would not be able to generate identical copies of the shared secret key indicating that the Meteor Key Distribution is impossible in practice. In addition, a complicated astronomical nature of the meteor burst channel causes deep diurnal variation in its performance. The aim of our research was a comprehensive evaluation of potential performance of the Meteor Key Distribution systems, taking into account all the physical layer effects of meteor burst channel. We also wanted to clarify, how strong the imperfection of a real meteor burst channel affects the key distribution feasibility.

Download


Paper Citation


in Harvard Style

I. Sulimov A. and V. Karpov A. (2015). Performance Evaluation of Meteor Key Distribution . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 392-397. DOI: 10.5220/0005568003920397

in Bibtex Style

@conference{secrypt15,
author={Amir I. Sulimov and Arkadiy V. Karpov},
title={Performance Evaluation of Meteor Key Distribution},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={392-397},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005568003920397},
isbn={978-989-758-117-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - Performance Evaluation of Meteor Key Distribution
SN - 978-989-758-117-5
AU - I. Sulimov A.
AU - V. Karpov A.
PY - 2015
SP - 392
EP - 397
DO - 10.5220/0005568003920397