HAN Yuanzhi and HU Aiqun, “An Improved Key Generation Scheme Based on Multipath Channel Measurements,” Chinese Journal of Electronics, vol. 26, no. 1, pp. 185-191, 2017, doi: 10.1049/cje.2016.10.005
Citation: HAN Yuanzhi and HU Aiqun, “An Improved Key Generation Scheme Based on Multipath Channel Measurements,” Chinese Journal of Electronics, vol. 26, no. 1, pp. 185-191, 2017, doi: 10.1049/cje.2016.10.005

An Improved Key Generation Scheme Based on Multipath Channel Measurements

doi: 10.1049/cje.2016.10.005
Funds:  This work is supported by the National Natural Science Foundation of China (No.61571110), and the National Basic Research Program of China (973 Program) (No.2013CB338003).
  • Received Date: 2015-01-04
  • Rev Recd Date: 2016-04-19
  • Publish Date: 2017-01-10
  • Channel reciprocity is a vital component for the key generation from multipath channels. In this paper, we introduce the effect of delay between measures on the channel reciprocity, build an Autoregression (AR) model to approximate time-varying channel measurements and apply a linear prediction method to reduce the measurement errors and to enhance the dependency between measurements of two communication parties. In the following bit conversion, we propose a novel quantization scheme named the Probability distance method (PDM) and compare its performance with other existing methods theoretically. The simulation results show that the optimal solution to the linear prediction problem can effectively increase the channel reciprocity in the assumed channel models. The proposed PDM can achieve a lower disagreement rate with acceptable costs.
  • loading
  • R.E. Shannon, "Communication theory of secrecy systems", The Bell System Technical Journal, Vol.28, No.4, pp.656-715, 1949.
    A.D. Wyner, "The wire-tap channel", The Bell System Technical Journal, Vol.54, No.8, pp.1355-1387, 1975.
    I. Csiszar and J. Korner, "Broadcast channels with confidential messages", IEEE Transactions on Information Theory, Vol.24, No.3, pp.339-348, 1978.
    U.M. Maurer, "Secret key agreement by public discussion from common information", IEEE Transactions on Information Theory, Vol.39, No.3, pp.733-742, 1993.
    R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, part I:Secret sharing", IEEE Transactions on Information Theory, Vol.39, No.4, pp.1121-1132, 1993.
    N. Patwari, J. Croft, S. Jana, et al., "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements", IEEE Transactions on Mobile Computing, Vol.9, No.1, pp.17-30, 2010.
    X.J. Zhu, F.Y. Xu, E. Novak, et al., "Extracting secret key from wireless link dynamics in vehicular environments", Proc. of IEEE International Conference on Computer Communications, Turin, Italy, pp.2283-2291, 2013.
    Y.P. Liu, S. Draper and A. Sayeed, "Exploiting channel diversity in secret key generation from multipath fading randomness", IEEE Transactions on Information Forensics and Security, Vol.7, No.5, pp.1484-1497, 2012.
    C.X. Ye, A. Reznik and Y. Shah, "Extracting secrecy from jointly gaussian random variables", Proc. of IEEE International Symposium on Information Theory, Seattle, Washington, USA, pp.2593-2597, 2006.
    A. Sayeed and A. Perrig, "Secure wireless communications:Secret keys through multipath", Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, Nevada, USA, pp.3013-3016, 2008.
    S. Mathur, W. Trappe, N. Mandayam, et al., "Radio-telepathy:Extracting a secret key from an unauthenticated wireless channel", Proc. of ACM Annual International Conference on Mobile Computing and Networking, San Francisco, California, USA, pp.128-139, 2008.
    Y. Shehadeh and D. Hogrefe, "An optimal guard-intervals based mechanism for key generation from multipath wireless channels", Proc. of IFIP International Conference on New Technologies, Mobility and Security, Paris, France, pp.1-5, 2011.
    S. Premnath, S. Jana, J. Croft, et al., "Secret key extraction from wireless signal strength in real environments", IEEE Transactions on Mobile Computing, Vol.12, No.5, pp.917-930, 2013.
    G.Y. Li, A.Q. Hu and L. Shi, "Secret key extraction in wireless channel", Journal of Cryptologic Research, Vol.1, No.3, pp.211-224, 2014. (in Chinese)
    M. Patzold, Mobile Fading Channels, John Wiley & Sons, Baffins Lane, Chichester, UK, 2002.
    F.M. He, H. Man and W. Wang, "Physical layer assisted security for mobile ofdm networks", Proc. of IEEE Vehicular Networking Conference, Jersey City, NJ, USA, pp.346-353, 2010.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (402) PDF downloads(1068) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return