Comparative simulation for physical layer key generation methods
Author | Saad A. |
Author | Mohamed A. |
Author | Elfouly T.M. |
Author | Khattab T. |
Author | Guizani M. |
Available date | 2022-04-21T08:58:29Z |
Publication Date | 2015 |
Publication Name | IWCMC 2015 - 11th International Wireless Communications and Mobile Computing Conference |
Resource | Scopus |
Identifier | http://dx.doi.org/10.1109/IWCMC.2015.7289068 |
Abstract | The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model of two mobile nodes in the presence of a passive eavesdropper is used to perform the comparison process. Important modifications are proposed to some phases' techniques in order to increase the performance of the generation process as a whole. Different metrics were used for comparison in each phase, in the distillation phase, we use the Bit Mismatch Rate (BMR) for different SNR values to compare various extracted random strings of the two intended nodes. On the other hand, the messaging rate and process complexity is exploited to estimate the performance of the compared techniques in both reconciliation and privacy amplification phases. The randomness and entropy properties of the keys are verified using the NIST suite, all the generated keys are 128 bits, it is shown that the success rate of the keys passing the randomness tests depends strongly on the techniques that are used through the three generation phases. 2015 IEEE. |
Sponsor | Qatar National Research Fund |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | Distillation Mobile computing Random processes Wireless telecommunication systems cascaded techniques Key generation Physical layer security Privacy amplification reconciliation Network layers |
Type | Conference |
Pagination | 120-125 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2428 items ]