CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secret Key Generation for Fading Wireless Channel

Published on None 2011 by Rittu Simon, Aby.K.Thomas
journal_cover_thumbnail
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 1
None 2011
Authors: Rittu Simon, Aby.K.Thomas
6c67ec14-a32c-490f-9d8e-a74058aa89fe

Rittu Simon, Aby.K.Thomas . Secret Key Generation for Fading Wireless Channel. International Conference on VLSI, Communication & Instrumentation. ICVCI, 1 (None 2011), 21-24.

@article{
author = { Rittu Simon, Aby.K.Thomas },
title = { Secret Key Generation for Fading Wireless Channel },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 1 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 21-24 },
numpages = 4,
url = { /proceedings/icvci/number1/2628-1119/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A Rittu Simon
%A Aby.K.Thomas
%T Secret Key Generation for Fading Wireless Channel
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 1
%P 21-24
%D 2011
%I International Journal of Computer Applications
Abstract

The multipath-rich wireless atmosphere allied with typical wireless usage scenarios is characterized by a vanishing channel retort that is time-varying, location-sensitive, and only shared by a given transmitter–receiver pair. The complexity allied with a highly scattering atmosphere implies that the short-term vanishing process is intrinsically hard to envisage and best modeled stochastically, with speedy decorrelation properties in space, time, and frequency. Here we reveal how the channel position between a wireless transmitter and receiver can be used as the basis for building practical secret key establishment protocols between two terminals. We start off by presenting a system based on level crossings of the vanishing process, which is compatible for the Rayleigh and Rician fading models allied with a highly scattering atmosphere. The level crossing algorithm is simple, and incorporates a self-authenticating method to prevent adversarial exploitation of data interactions during the protocol. As the level crossing algorithm is best matched for vanishing processes that show equilibrium in their underlying distribution, we present a second and more authoritative approach that is suited for more wide-ranging channel status distributions. This second method is motivated by interpretation from dividing mutually Gaussian processes, but exploits empirical dimensions to set quantization boundaries and a heuristic log probability ratio estimate to achieve a higher secret key generation rate. We evaluate both projected protocols through demonstrations using a customized IEEE 802.11 a stage, and show the effect from the hackers point of view.

References
  1. B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener,2007.Robust key generation from signal envelopes in wireless networks.
  2. M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin.2008.Wireless information-theoretic security.
  3. M. Bloch,A. Thangaraj, S.W.McLaughlin,and J.M.Merolla,2006.LDPC-based Gaussian key reconciliation.
  4. S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik.2008.Radiotelepathy:Extracting a secret key from an unauthenticated wireless channel
  5. U. M. Maurer,1997.Information-theoretically secure secret-key agreement by NOT authenticated public discussion.
  6. L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe.2008.Using the physical layer for wireless authentication under time-variant channels.
  7. R. Wilson, D. Tse, and R. Scholtz.2007.Channel identification: Secret sharing using reciprocity in ultrawideband channels.
  8. U. M. Maurer and S. Wolf.2000.Information-theoretic key agreement :From weak to strong secrecy for free.
Index Terms

Computer Science
Information Sciences

Keywords

fundamental foundation sculpt level crossing rate Rician channel Rayleigh channel