Application cases of secret key generation in communication nodes and terminals

Application cases of secret key generation in communication nodes and terminals

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.

Chapter Contents:

  • 19.1 Introduction
  • 19.2 Fundamental aspects of secret key generation
  • 19.2.1 Channel-based random bit generators
  • A shared source owing to reciprocity
  • Randomness owing to multipath propagation
  • Confidentiality
  • 19.2.2 Metrics for secret key generation assessment
  • 19.2.3 Impact of channel characteristics
  • 19.3 Integration of secret key generation into existing radio access technologies
  • 19.3.1 Practical secret key generation scheme
  • Channel estimation - application case to OFDM signals
  • Channel decorrelation
  • Quantization
  • Information reconciliation
  • Privacy amplification
  • 19.3.2 Simulation results from single sense recorded signals
  • Impact of the SKG preprocessing step on the randomness of generated keys
  • Evaluation of the randomness of the keys using NIST statistical tests
  • Entropy estimation and analysis
  • 19.3.3 Simulation results from dual sense LTE signals
  • Simulators
  • Channel coefficient estimates
  • Simulations scenarios and parameters
  • Simulation results
  • Discussion
  • 19.3.4 Experimental results from dual sense WiFi signals
  • WiFi Test bed and measurement environment
  • Processing applied for bidirectional sounding exchange
  • Practical implantation of SKG from bidirectional channel estimates by WiFi chipsets
  • Results without channel decorrelation processing
  • Results with channel decorrelation processing
  • 19.4 Conclusion: security upgrades opportunities for radio access technologies
  • 19.4.1 Existing vulnerabilities
  • 19.4.2 Proposed solutions for securing radio access protocols with secret key generation
  • 19.4.3 Practical usage of secret key generation into radio access technologies
  • References

Inspec keywords: Long Term Evolution; decorrelation; telecommunication security; quantisation (signal); wireless channels; next generation networks; cryptography

Other keywords: radio-cells; public networks; WiFi; radio communication security; LTE; next-generation radio standards; channel decorrelation techniques; CQA algorithm; secret key generation schemes; channel quantization alternate algorithm; communication nodes; Long-Term Evolution; SKG schemes; communication terminals

Subjects: Mobile radio systems; Cryptography; Signal processing and detection

Preview this chapter:
Zoom in

Application cases of secret key generation in communication nodes and terminals, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch19-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch19-2.gif

Related content

This is a required field
Please enter a valid email address