Secret Key Generation Using OFDM Samples

被引:8
作者
Kakkar, Shantnu [1 ]
Makkar, Inderpreet Singh [1 ]
Mohapatra, A. K. [2 ]
机构
[1] Univ Sch Informat & Commun Technol, GGSIPU, Delhi, India
[2] Indira Gandhi Delhi Technol Univ Women, Delhi, India
关键词
Additive White Gaussian Noise (AWGN); Bit Error Rate (BER); Eavesdropper; Jamming; Orthogonal Frequency Division Multiplexing (OFDM); Physical layer security; wireless communication;
D O I
10.1080/09720529.2015.1032577
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Information is regarded as a resource with highest organizational value. Its confidentiality, integrity and authenticity are important for any organization. The broadcast nature of wireless medium makes communication vulnerable to security attacks such as eavesdropping, non-repudiation, denial of service and more. Hence, prior to transmission of information, a secret key is securely exchanged between sender and receiver. Conventional key generation algorithms work at the application layer. However, they suffer from computational overheads and require a reliable third party. Moreover, when system grows complex, these methods start failing considerably. To encounter these issues, a novel key exchange mechanism is proposed which works at the physical layer. The proposed method is based on the concept of self-jamming and exploits the properties of Orthogonal Frequency Division Multiplexing (OFDM). The simulation results show that the proposed scheme has a low Bit Error Rate (BER) for the receiver and high BER for the eavesdropper. It has also been shown that the number of attempts that eavesdropper has to make to guess the correct key are large, thereby decreasing its probability to decode the correct key.
引用
收藏
页码:439 / 454
页数:16
相关论文
共 18 条
[1]  
Achatz RJ, 1997, 1997 WIRELESS COMMUNICATIONS CONFERENCE, PROCEEDINGS, P234, DOI 10.1109/WCC.1997.622285
[2]   Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels [J].
Aono, T ;
Higuchi, K ;
Ohira, T ;
Komiyama, B ;
Sasaoka, H .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (11) :3776-3784
[3]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[4]  
Dong L., 2009, ARXIV09074996
[5]  
Dzung D, 2010, U.S. Patent, Patent No. [7,752,430, 7752430]
[6]  
Gollakota S, 2011, IEEE INFOCOM SER, P1125, DOI 10.1109/INFCOM.2011.5934889
[7]  
Hossain E., 2007, COMM NETW SRV REAS 2, P72
[8]  
Hwang Taewon, 2008, OFDM ITS WIRELESS AP, V58, P1673
[9]  
Lauter K, 2006, LECT NOTES COMPUT SC, V3958, P378
[10]  
Menezes A.J, 1996, HDB APPL CRYPTOGRAPH