Secret Group Key Generation in Physical Layer for Mesh Topology

作者: Chan Dai Truyen Thai , Jemin Lee , Tony Q. S. Quek

DOI: 10.1109/GLOCOM.2015.7417477

关键词:

摘要: Secret group key generation based on physical layer in wireless communications has a lot of practical applications. A few studies focused the theoretical bounds secret rate sets received signals rather than particular scheme. We propose scheme for an arbitrary number legitimate nodes, n, mesh topology presence passive eavesdropper. In scheme, after general pilot signal transmissions at all each node broadcasts weighted combination its with optimized coefficients, so that nodes can obtain information channels used while eavesdropper cannot. also apply different quantization schemes quantizing and encoding estimated into keys. To provide detailed processing steps generation, we describe proposed 4-node case. The simulation results show achieves higher lower disagreement benchmark

参考文章(11)
Heng Zhou, Lauren M. Huie, Lifeng Lai, Secret Key Generation in the Two-Way Relay Channel With Active Attackers IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 476- 488 ,(2014) , 10.1109/TIFS.2014.2301233
Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, Can Emre Koksal, Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation IEEE Transactions on Mobile Computing. ,vol. 13, pp. 2820- 2835 ,(2014) , 10.1109/TMC.2014.2310747
Kui Ren, Hai Su, Qian Wang, Secret key generation exploiting channel characteristics in wireless communications IEEE Wireless Communications. ,vol. 18, pp. 6- 12 ,(2011) , 10.1109/MWC.2011.5999759
R. Ahlswede, I. Csiszar, Common randomness in information theory and cryptography. I. Secret sharing IEEE Transactions on Information Theory. ,vol. 39, pp. 1121- 1132 ,(1993) , 10.1109/18.243431
Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka, Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems IEEE Transactions on Information Forensics and Security. ,vol. 6, pp. 650- 660 ,(2011) , 10.1109/TIFS.2011.2147314
Y. Linde, A. Buzo, R. Gray, An Algorithm for Vector Quantizer Design IEEE Transactions on Communications. ,vol. 28, pp. 84- 95 ,(1980) , 10.1109/TCOM.1980.1094577
Youssef El Hajj Shehadeh, Dieter Hogrefe, An Optimal Guard-Intervals Based Mechanism for Key Generation from Multipath Wireless Channels new technologies, mobility and security. pp. 1- 5 ,(2011) , 10.1109/NTMS.2011.5720584
I. Csiszar, P. Narayan, Secrecy capacities for multiple terminals IEEE Transactions on Information Theory. ,vol. 50, pp. 3047- 3061 ,(2004) , 10.1109/TIT.2004.838380
Sana Tmar Ben Hamida, Jean-Benoit Pierrot, Claude Castelluccia, An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements 2009 3rd International Conference on New Technologies, Mobility and Security. pp. 59- 63 ,(2009) , 10.1109/NTMS.2009.5384826
Chan Dai Truyen Thai, Jemin Lee, Tony Q. S. Quek, Physical-Layer Secret Key Generation With Colluding Untrusted Relays IEEE Transactions on Wireless Communications. ,vol. 15, pp. 1517- 1530 ,(2016) , 10.1109/TWC.2015.2491935