期刊文献+

Physical layer secret key generation scheme used in 60 GHz band

Physical layer secret key generation scheme used in 60 GHz band
原文传递
导出
摘要 The technology of 60 GHz radio is considered promising for providing fast connectivity and gigabit data rate. One of the main challenges to its secure indoor transmission is how to generate secret keys between communication devices. To investigate this issue, The authors develop an efficient mechanism of secret key generation exploiting multipath relative delay based on 60 GHz standard channel models. The comparison of key-mismatch probability between line-of-sight (LOS) and non-line-of-sight (NLOS) environments is considered. Verification of the proposed scheme is conducted. Simulation shows that the number of extracted multipath components proportionally did affect key generation rate and key-mismatch probability. It also indicates that communicating transceivers have a slightly lower key-mismatch probability in NLOS condition than in LOS condition. Moreover, in comparison to the existing approach of using received signal amplitude as a common random source, the mechanism can achieve better performance in key agreement. The technology of 60 GHz radio is considered promising for providing fast connectivity and gigabit data rate. One of the main challenges to its secure indoor transmission is how to generate secret keys between communication devices. To investigate this issue, The authors develop an efficient mechanism of secret key generation exploiting multipath relative delay based on 60 GHz standard channel models. The comparison of key-mismatch probability between line-of-sight (LOS) and non-line-of-sight (NLOS) environments is considered. Verification of the proposed scheme is conducted. Simulation shows that the number of extracted multipath components proportionally did affect key generation rate and key-mismatch probability. It also indicates that communicating transceivers have a slightly lower key-mismatch probability in NLOS condition than in LOS condition. Moreover, in comparison to the existing approach of using received signal amplitude as a common random source, the mechanism can achieve better performance in key agreement.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第5期76-82,共7页 中国邮电高校学报(英文版)
基金 supported by National Natural Science Foundation of China (61171176)
关键词 60 GHz secret key generation RECIPROCITY multipath relative delay 60 GHz, secret key generation, reciprocity, multipath relative delay
  • 相关文献

参考文献1

二级参考文献10

  • 1MAURER U M. Secret key agreement by public discussion from com- mon information [ J ]. IEEE Trans on Information Theory, 1993,39 (4) :?33-742.
  • 2AONO T, HIGUCHI K, OHIRA T,et al. Wireless secret key generation exploiting reactance-domain scalar response of muhipath fading chan- nels[J]. IEEE Trans on Antennas and propagation,2005,53 ( 11 ) :3776-3784.
  • 3JANA S,PREMNATH S N, CLARK M, et al. On the effectiveness of secret key extraction from wireless signal strength in real environ- ments[ C]//Proc of the 15th ACM Conference on Mobile Computing and Networking. New York : ACM Press ,2009:321-332.
  • 4AZIMI-SADJADI B, KIAYIAS A, MERCADO A,et al. Robust key generation from signal envelopes in wireless networks [ C ]//Proc of the 14th ACM Conference on Computer and Communications Security. New York : ACM Press,2007:401 - 410.
  • 5HAMIDA T S B, PIERROT J B, CASTELLUCCIA C. An adaptive quantization algorithm for secret key generation using radio channel measurements[ C ]//Proc of the 3rd International Conference on New Technologies, Mobility and Security. Piscataway, NJ : IEEE Press, 2009:59-63.
  • 6WILSON R,TSE D, SCHOLTZ R A. Channel identification: secret sharing using reciprocity in UWB channels [ J]. IEEE Trans on In- formation Forensics and Security, 2007,2(3) : 64-375.
  • 7PATWARI N, CROFT J, JANA S. High rate uncorrelated bit extraction for shared secret key generation from channel measurements [ J ]. IEEE Trans on Mobile Computing, 20i0, 9(3) : 17-30.
  • 8KOORAPATY H, HASSAN A A, CHENNAKESHU S. Secure infor- mation transmission for mobile radio [ J ]. IEEE Communications Letters, 2000, 4(2) : 52-55.
  • 9MATHUR S, TRAPPE W, MANDAYAM N, et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel [C]// Proc of the 14th ACM International Conference on Mobile Computing and Networking. New York : ACM Press, 2008 : 128-139.
  • 10Di BENEDETTO MG,GIANCOLA G,葛利嘉译.超宽带无线电基础[M].北京:电子工业出版社,2005.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部