scispace - formally typeset
Open AccessJournal ArticleDOI

Robust secret key extraction from channel secondary random process

TLDR
This paper proposes a new simple technique to generate the secret key that mitigates the effect of noise and exploits the estimated channel to generate a secondary random process SRP that is common between the two legitimate nodes.
Abstract
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate nodes affects the reciprocity of the channel. In this paper, we propose a new simple technique to generate the secret key that mitigates the effect of noise. Specifically, we exploit the estimated channel to generate a secondary random process SRP that is common between the two legitimate nodes. We compare the estimated channel gain and phase to a preset threshold. The moving differences between the locations at which the estimated channel gain and phase exceed the threshold are the realization of our SRP. We study the properties of our generated SRP and derive a closed form expression for the probability mass function of the realizations of our SRP. We simulate an orthogonal frequency division multiplexing system and show that our proposed technique provides a drastic improvement in the key bit mismatch rate between the legitimate nodes when compared with the techniques that exploit the estimated channel gain or phase directly. In addition to that, the secret key generated through our technique is longer than that generated by conventional techniques. Moreover, we compute the conditional probabilities used to estimate the secret key capacity. Copyright © 2016 John Wiley & Sons, Ltd.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels

TL;DR: Analytical and simulation results are presented to demonstrate the superiority of the proposed SKG method for TDD-OFDM systems over frequency-selective fading channels over multipath fading channels.
Journal ArticleDOI

Joint Random Subcarrier Selection and Channel-Based Artificial Signal Design Aided PLS

TL;DR: A channel-based joint random subcarrier selection and artificial signal design are introduced to protect the communication in the presence of a strong passive eavesdropper to provide physical layer security depending on the randomness of wireless channel.
DissertationDOI

Practical Secrecy at the Physical Layer: Key Extraction Methods with Applications in Cognitive Radio

Ahmed Badawy
TL;DR: A channel based SKG algorithm that increases the dynamic range of the key generation system and an algorithm that exploits angle of arrival (AoA) as a common source of randomness to generate the secret key is designed.
Proceedings ArticleDOI

PLS Performance Analysis of a Hybrid NOMA-OMA based IoT System with Mobile Sensors

TL;DR: This paper derives the Key Agreement Probability (KAP) expression of the proposed scheme, and investigates the corresponding Secrecy Outage Probable (SOP) and the Average Bit Rate (ABR) when compared to pure NOMA and pure OMA transmission schemes.
Journal ArticleDOI

Securing NextG Networks with Physical-Layer Key Generation: A Survey

TL;DR: In this article , the authors survey existing research and discuss the performance advantages of PKG compared to cryptography schemes, as well as the principles and processes of PHY-layer key generation, and new application scenarios and development potential for PKG in next-generation communication networks, particularly analyzing the effect and prospects of PKE in massive MIMO, reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication.
References
More filters
Journal ArticleDOI

Fundamentals of statistical signal processing: estimation theory

TL;DR: The Fundamentals of Statistical Signal Processing: Estimation Theory as mentioned in this paper is a seminal work in the field of statistical signal processing, and it has been used extensively in many applications.
MonographDOI

Introduction to Numerical Analysis

TL;DR: 1. The numerical evaluation of expressions 2. Linear systems of equations 3. Interpolation and numerical differentiation 4. Numerical integration 5. Univariate non linear equations 6. Systems of nonlinear equations.
Journal ArticleDOI

Secret key agreement by public discussion from common information

TL;DR: It is shown that such a secret key agreement is possible for a scenario in which all three parties receive the output of a binary symmetric source over independent binary asymmetric channels, even when the enemy's channel is superior to the other two channels.
Journal ArticleDOI

Generalized privacy amplification

TL;DR: This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.
Related Papers (5)
Frequently Asked Questions (8)
Q1. What are the contributions mentioned in the paper "Robust secret key extraction from channel secondary random process" ?

In this paper, the authors propose a new simple technique to generate the secret key that mitigates the effect of noise. The authors study the properties of their generated SRP and derive a closed form expression for the probability mass function of the realizations of their SRP. The authors simulate an orthogonal frequency division multiplexing ( OFDM ) system and show that their proposed technique provides a drastic improvement in the key bit mismatch rate ( BMR ) between the legitimate nodes when compared to the techniques that exploit the estimated channel gain or phase directly. 

The reduction in entropy resulting from their method which is associated with significant reduction in BMR has the advantage that less exchange of messages is needed in the subsequent phases of information reconciliation and privacy amplifications. 

To find a closed form expression for the probability mass function of each entry in Jg , which the authors denote by P (Jg[i] = jg), the authors use the Lagrange interpolating polynomial formula [23]. 

The channel phase, θ, follows a uniform distribution with probability density function defined as:f(θ) = 12π , for 0 ≤ θ ≤ 2π (16)Hence,pph = 1− γph 2π . 

The steps to generate their SRP are:1) Both Alice and Bob use their estimated channel gain to estimate a threshold (γg) as:γAg = E[|ĤALS |] + α std(|ĤALS |) (8) γBg = E[|ĤBLS |] + α std(|ĤBLS |), (9)where E[.] is the mean operation, std(.) is the standard deviation operation and α is a design parameter ∈ [−1 : 1]. 

This implies that for the level crossing rate technique to achieve a reasonable key length, the frequency of channel propping should increase which decreases the throughput of the system. 

In the first step, Alice and Bob exchange beacon signals, from which each estimates the physical layer characteristics that are used as common sources of randomness. 

the entry in Jg is 1 with probability lg(vg, ug) lg(vg + 1, ug + 1). • Case 3: the first (out of the two producing Jg entry) entry is zero and the second is a value of the NB randomvariable.