On the trade-off between rate and reliability for secret key generation in wireless channels

被引:0
作者
Sandell, Magnus [1 ]
机构
[1] Toshiba Europe Ltd, Bristol Res & Innovat Lab, Bristol, England
来源
SECURITY AND PRIVACY | 2024年 / 7卷 / 06期
关键词
physical layer security; quantisation; secret key generation;
D O I
10.1002/spy2.439
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless propagation channels can be used to obtain secret keys to enhance security. By exploiting the reciprocity of the channel between legitimate users and its independence of an eavesdropper's channel, it can be quantised to produce a string of bits. The quality of these bits can be enhanced by using guard bands when quantising, which means that some samples are not used due to their poor quality. Although this increases the probability that the legitimate users produce the same bits, it also reduces the number of generated bits. We derive the optimal trade-off between these contrasting quantities, first for a single sample and then extended to a frequency-selective channel. The results are presented for both software simulations and hardware evaluations.
引用
收藏
页数:11
相关论文
共 21 条
  • [1] On Quantization for Secret Key Generation From Wireless Channel Samples
    Adil, Muhammad
    Wyne, Shurjeel
    Nawaz, Syed Junaid
    [J]. IEEE ACCESS, 2021, 9 : 21653 - 21668
  • [2] Balasch J, 2018, 2018 12TH EUROPEAN WORKSHOP ON MICROELECTRONICS EDUCATION (EWME), P63, DOI 10.1109/EWME.2018.8629481
  • [3] PARETO OPTIMALITY IN MULTIOBJECTIVE PROBLEMS
    CENSOR, Y
    [J]. APPLIED MATHEMATICS AND OPTIMIZATION, 1977, 4 (01) : 41 - 59
  • [4] Cintas Canto A., 2023, ALGORITHMIC SECURITY, DOI [10.36227/techrxiv.23071079.v1, DOI 10.36227/TECHRXIV.23071079.V1]
  • [5] Darzi S., 2023, ENVISIONING FUTURE C
  • [6] Erceg V., 2004, TGN CHANNEL MODELS I
  • [7] IEEE 802.11n, 2009, AMENDMENT 5 ENHANCEM, DOI [10.1109/IEEESTD.2009.5307322, DOI 10.1109/IEEESTD.2009.5307322]
  • [8] Secret Key Generation Schemes for Physical Layer Security
    Kumar, Megha S.
    Ramanathan, R.
    Jayakumar, M.
    Yadav, Devendra Kumar
    [J]. DEFENCE SCIENCE JOURNAL, 2021, 71 (04) : 545 - 555
  • [9] High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
    Patwari, Neal
    Croft, Jessica
    Jana, Suman
    Kasera, Sneha Kumar
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (01) : 17 - 30
  • [10] Secret Key Extraction from Wireless Signal Strength in Real Environments
    Premnath, Sriram Nandha
    Jana, Suman
    Croft, Jessica
    Gowda, Prarthana Lakshmane
    Clark, Mike
    Kasera, Sneha Kumar
    Patwari, Neal
    Krishnamurthy, Srikanth V.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (05) : 917 - 930