Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller

被引:52
作者
Wei, Yunchuan [1 ]
Zeng, Kai [2 ]
Mohapatra, Prasant [3 ]
机构
[1] Beijing Inst Technol, Sch Automat, Beijing 100081, Peoples R China
[2] Univ Michigan, Dept Comp & Informat Sci, Dearborn, MI 48128 USA
[3] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
Wireless channel probing; shared key generation; information theory; PID controller;
D O I
10.1109/TMC.2012.144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Generating a shared key between two parties from the wireless channel is an increasingly interesting topic. The process of obtaining information from the wireless channel is called channel probing. Previous key generation schemes probe the channel at a preset and constant rate without any consideration of channel variation or probing efficiency. To satisfy the users' requirements for key generation rate (KGR) and to use the wireless channel efficiently, we propose an adaptive channel probing scheme based on the proportional-integral-derivative controller, which is used to tune the probing rate. Moreover, we use the Lempel-Ziv complexity to estimate the entropy rate of channel statistics (received signal strength), which is considered as an indicator of probing efficiency. The experimental results show that the controller can dynamically tune the probing rate and, meanwhile, to achieve a user desired KGR. It stabilizes the KGR at the desired value with error below 1 bit/s. Besides, channel probing process is efficient under different user velocities, motion types, and sites.
引用
收藏
页码:1842 / 1852
页数:11
相关论文
共 28 条
[1]   Estimating the entropy rate of spike trains via Lempel-Ziv complexity [J].
Amigó, JM ;
Szczepanski, J ;
Wajnryb, E ;
Sanchez-Vives, MV .
NEURAL COMPUTATION, 2004, 16 (04) :717-736
[2]  
[Anonymous], 2001, WIRELESS COMMUNICATI
[3]  
[Anonymous], P IEEE INT C ULTR IC
[4]  
[Anonymous], 1981, RFC 792
[5]  
Aono T, 2005, EURO WIREL TECHNOL C, P173
[6]   Robust Key Generation from Signal Envelopes in Wireless Networks [J].
Azimi-Sadjadi, Babak ;
Kiayias, Aggelos ;
Mercado, Alejandra ;
Yener, Bulent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :401-+
[7]  
Badii R., 1997, COMPLEXITY HIERARCHI
[8]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[9]  
Blanc J.-L., 2008, P NEUROCOMP C
[10]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35]