Secret Key Generation Scheme Based on Generative Adversarial Networks in FDD Systems

被引:5
作者
Hou, Zongyue [1 ]
Zhang, Xinwei [1 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing, Peoples R China
来源
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021) | 2021年
基金
中国国家自然科学基金;
关键词
Deep learning; boundary equilibrium generative adversarial network; key generation; frequency division duplexing; CSI;
D O I
10.1109/INFOCOMWKSHPS51825.2021.9484457
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In frequency division duplexing (FDD) systems, the uplink and downlink transmit information in different frequency bands, so it is difficult to use channel reciprocity to generate secret keys. Existing key generation methods for FDD systems have excessive overhead and security problems. This paper uses deep learning to predict the downlink channel state information (CSI) from the uplink CSI, so that two users can generate highly similar downlink CSI in FDD systems. We propose a key generation scheme based on boundary equilibrium generative adversarial network (BEGAN), including channel estimation, reciprocal channel feature construction, quantization, information reconciliation and privacy amplification. Numerical simulation results are presented to verify the feasibility and effectiveness of the proposed scheme.
引用
收藏
页数:6
相关论文
共 16 条
[1]   Contribution of the Zubair source rocks to the generation and expulsion of oil to the reservoirs of the Mesopotamian Basin, Southern Iraq [J].
Al-Khafaji, Amer Jassim ;
Sadooni, Fadhil ;
Hindi, Mohammed Hadi .
PETROLEUM SCIENCE AND TECHNOLOGY, 2019, 37 (08) :940-949
[2]  
Alrabeiah M., 2019, arXiv, DOI [10.48550/arXiv.1905.03761, DOI 10.48550/ARXIV.1905.03761]
[3]  
[Anonymous], Remcom Wireless Insite
[4]  
Arnold M., 2019, ARXIV
[5]  
Berthelot D, 2017, Arxiv, DOI arXiv:1703.10717
[6]   Quantization in zero leakage helper data schemes [J].
de Groot, Joep ;
Skoric, Boris ;
de Vreede, Niels ;
Linnartz, Jean-Paul .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2016,
[7]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[8]  
Goldberg S. J., 2013, U.S. Patent, Patent No. 8401196
[9]   Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems [J].
Li, Guyue ;
Hu, Aiqun ;
Sun, Chen ;
Zhang, Junqing .
IEEE COMMUNICATIONS LETTERS, 2018, 22 (12) :2487-2490
[10]  
Safari MS, 2019, Arxiv, DOI [arXiv:1812.07518, 10.48550/arXiv.1812.07518, DOI 10.48550/ARXIV.1812.07518]