Comparative simulation for physical layer key generation methods
Abstract
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model of two mobile nodes in the presence of a passive eavesdropper is used to perform the comparison process. Important modifications are proposed to some phases' techniques in order to increase the performance of the generation process as a whole. Different metrics were used for comparison in each phase, in the distillation phase, we use the Bit Mismatch Rate (BMR) for different SNR values to compare various extracted random strings of the two intended nodes. On the other hand, the messaging rate and process complexity is exploited to estimate the performance of the compared techniques in both reconciliation and privacy amplification phases. The randomness and entropy properties of the keys are verified using the NIST suite, all the generated keys are 128 bits, it is shown that the success rate of the keys passing the randomness tests depends strongly on the techniques that are used through the three generation phases. 2015 IEEE.
Collections
- Computer Science & Engineering [2402 items ]