New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation

被引:1
作者
Adil, Muhammad [1 ]
Ullah Khan, Habib [2 ]
Arif, Mohammad [3 ]
Shah Nawaz, Mian [1 ]
Khan, Faheem [3 ]
机构
[1] Abasyn Univ, Dept Microbiol, Peshawar 25000, Pakistan
[2] Qatar Univ, Coll Business & Econ, Dept Accounting & Informat Syst, Doha, Qatar
[3] Gachon Univ, Dept Comp Engn, Seongnam Si 13120, South Korea
关键词
Quantization (signal); Wireless communication; Communication system security; Security; Fading channels; NIST; 6G mobile communication; Secret key generation; stochastic wireless channel; quantization regions; excursions; QUANTIZATION; SECURITY; 6G; ESTABLISHMENT; CHALLENGES; PRIVACY; VISION;
D O I
10.1109/ACCESS.2024.3411556
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical Layer-based Secret Key Generation (PLSKG) between the legitimate nodes from the reciprocal wireless channel is a vastly studied area of Physical Layer Security (PLS). PLSKG aims to secure the wireless link between the legitimate nodes by symmetrically encrypting the wirelessly transmitted information via a secret key that is extracted from the common randomness of the stochastic wireless channel. PLSKG encompasses the intermediate steps of channel sampling, quantization, information reconciliation, and privacy amplification. The PLSKG algorithms are evaluated in terms of quantifiers such as Key Generation Rate (KGR), Key Agreement Probability (KAP), and randomness. The practical PLSKG algorithms (level-crossing algorithms) extract a secret key by analyzing the channel samples and assigning bit sequences to the channel samples lying in different quantization regions. Level-crossing algorithms are lossy and extract a secret key from the central samples of matched excursions between the legitimate nodes. This results in a reduced KGR as there is a scarcity of such matched excursions considering the fast variations of the wireless link between the legitimate nodes. This paper proposes a Two-Round Channel Parsing (TRCP) algorithm that exploits the correlation between the excursion lengths of the channel samples in addition to the sample correlation. TRCP effectively utilize the channel samples by reducing the sample losses incurred by lossy quantizers exploring a new dimension of correlated excursions of the channel samples between legitimate nodes. Simulation results demonstrate that the proposed TRCP scheme enhances the KGR and KAP performance of the secret key and also passes the National Institute of Standards and Technology (NIST) test suite of randomness.
引用
收藏
页码:82972 / 82983
页数:12
相关论文
共 43 条
[1]   Average Contiguous Duration (ACD)-Based Quantization for Secret Key Generation in Generalized Gamma Fading Channels [J].
Adil, Muhammad ;
Wyne, Shurjeel ;
Nawaz, Syed Junaid ;
Muhammad, Bilal .
IEEE ACCESS, 2021, 9 :110435-110450
[2]   On Quantization for Secret Key Generation From Wireless Channel Samples [J].
Adil, Muhammad ;
Wyne, Shurjeel ;
Nawaz, Syed Junaid .
IEEE ACCESS, 2021, 9 :21653-21668
[3]  
Andrews G.E., 1999, Encyclopedia of Mathematics and Its Applications, V71
[4]  
Bassham L. E., 2010, Standard Sp 800-22 Rev. 1A
[5]   An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications [J].
Bloch, Matthieu ;
Guenlue, Onur ;
Yener, Aylin ;
Oggier, Frederique ;
Poor, H. Vincent ;
Sankar, Lalitha ;
Schaefer, Rafael F. .
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY, 2021, 2 (01) :5-22
[6]   Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications [J].
Bottarelli, Mirko ;
Karadimas, Petros ;
Epiphaniou, Gregory ;
Ismail, Dhouha Kbaier Ben ;
Maple, Carsten .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (03) :2310-2321
[7]   Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients [J].
Chen, Chan ;
Jensen, Michael A. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (02) :205-215
[8]   Context-Aware Security for 6G Wireless: The Role of Physical Layer Security [J].
Chorti A. ;
Barreto A.N. ;
Köpsell S. ;
Zoli M. ;
Chafii M. ;
Sehier P. ;
Fettweis G. ;
Poor H.V. .
IEEE Communications Standards Magazine, 2022, 6 (01) :102-108
[9]  
Ferguson N., 2011, CRYPTOGRAPHY ENG DES
[10]   New Physical Layer Key Generation Dimensions: Subcarrier Indices/Positions-Based Key Generation [J].
Furqan, Haji M. ;
Hamamreh, Jehad M. ;
Arslan, Huseyin .
IEEE COMMUNICATIONS LETTERS, 2021, 25 (01) :59-63