Channel secondary random process for robust secret key generation
Author | Badawy A. |
Author | Khattab T. |
Author | Elfouly T. |
Author | Chiasserini C.-F. |
Author | Mohamed A. |
Author | Trinchero D. |
Available date | 2022-04-21T08:58:29Z |
Publication Date | 2015 |
Publication Name | IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference |
Resource | Scopus |
Identifier | http://dx.doi.org/10.1109/IWCMC.2015.7289067 |
Abstract | The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. Most of the current physical layer security techniques exploit channel randomness as a common source between two legitimate nodes to extract a secret key. In this paper, we propose a new simple technique to generate the secret key. Specifically, we exploit the estimated channel to generate a secondary random process (SRP) that is common between the two legitimate nodes. We compare the estimated channel gain and phase to a preset threshold. The moving differences between the locations at which the estimated channel gain and phase exceed the threshold are the realization of our SRP. We simulate an orthogonal frequency division multiplexing (OFDM) system and show that our proposed technique provides a drastic improvement in the key bit mismatch rate (BMR) between the legitimate nodes when compared to the techniques that exploit the estimated channel gain or phase directly. In addition to that, the secret key generated through our technique is longer than that generated by conventional techniques. 2015 IEEE. |
Sponsor | Qatar National Research Fund |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | Channel estimation Frequency division multiplexing Local area networks Mobile computing Network layers Orthogonal frequency division multiplexing Random processes Security of data Signal receivers Wireless telecommunication systems Conventional techniques Estimated channels Information leakage OFDM systems Orthogonal frequency division multiplexing systems Physical layer security Secret key generations Wireless communications Cryptography |
Type | Conference Paper |
Pagination | 114-119 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2264 items ]
-
Electrical Engineering [2555 items ]