1. Department of Electronic Engineering, Tsinghua University, Beijing 100084, China;
2. School of Information and Electronics, Beijing Institute of Technology, Beijing 100081, China;
3. Communication Engineering Department, Xiamen University, Xiamen 361005, China;
4. Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
Abstract：With the increasing demand for security, many systems take advantage of channel randomness to generate secret keys. However, when an eavesdropper has good knowledge of the environmental information and the position information of legal users, this method is not absolutely safe. The scattering environmental information cannot be kept secret but the system can still be secure based on the uncertainty of the positions of legal users due to the users movements and the limited observation ability of the eavesdroppers. This study analyzes the security of the position-based secret keys generation method with the security measured by the secret key rates. The calculational errors of the positions of the legal users in different scenarios (LOS, NLOS and different numbers of scattering objects) are analyzed first. Then, the impacts of the distance observation error, the azimuth observation error and the number of observations in each secret key generation period on the secret key rates are analyzed in simulations. The results show that the uncertainty of the positions of legal users can be used to provide security for the secret keys.
 Wallace J W, Sarma R K. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis [J]. Trans on Information Forensics and Security, 2010, 5(3): 381-392.
 Wallace J W, Chen C, Jensen M A. Key generation exploiting MIMO channel evolution: algorithms and theoretical limits [C]// EUCAP 2009. Berlin, German: IEEE Press, 2009: 1499-1503.
 Wallace J W. Secure physical layer key generation schemes: performance and information theoretic limits [C]// ICC 09. Dresden, German: IEEE Press. 2009: 1-5.
 Wang Q, Su H, Ren K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks [C]// Infocom 2011. Shanghai, China: IEEE Press, 2011: 1422-1430.
 Gungor O, Chen F, Koksal C E. Secret key generation from mobility [C]// Globecom 2011. Houston, USA: IEEE Press, 2011: 874-878.
 Gungor O, Chen F, Koksal C E. Secret key generation via locatlization and mobility in wireless networks [DB/OL]. [2014-10-01]. http://arxiv.org/abs/1112.2793v5.
 Zhang X D, Liang Y C. Prefiltering-based ESPRIT for estimating parameters of sinusoids in non-Gaussian ARMA noise [J].IEEE Trans Signal Processing, 1993, 43(1): 349-353.
 Fleury B H, Henri B. High-resolution channel parameter estimation for MIMO application using the SAGE algorithm [C]// 2002 International Zurich Seminar on Broadband communications. Zurich, Switzerland: IEEE Press, 2002: 301-309.
 Wyner A. The wire-tap channel [J]. Bell Syst Tech J, 1975, 54(8): 1355-1387.
 Bloch M R, Laneman J N. Secrecy form resolvability [DB/OL]. [2014-10-01].http://arxiv.org/abs/1105.5419v3.
 Chan Y T. A simple and efficient estimation for hyperbolic location [J]. IEEE Trans Signal Processing, 1994, 42(8): 1905-1915.
 Foy W. Position-location solutions by Taylor series estimation [J]. IEEE on Aerospace and Electronic Systems, 1976, 12(3): 187-194.
 Schau H C. Passive source localization employing interesting spherical surfaces from time of arrival differences [J]. IEEE Trans Acoustics, Speech and Signal Processing, 1987, 35(8): 1223-1225.