Cited 0 time in webofscience Cited 0 time in scopus

Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology

Title
Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology
Authors
Thai, Chan Dai TruyenLee, Je MinPrakash, JayQuek, Tony Q. S.
DGIST Authors
Lee, Je Min
Issue Date
2019-01
Citation
IEEE Transactions on Information Forensics and Security, 14(1), 18-33
Type
Article
Article Type
Article
Keywords
AntennasCodes (symbols)Mesh generationNetwork layersRadio broadcastingSoftware radioTopologyCommunication secreciesGroup keyKey generationNational Institute of Standards and TechnologyPassive eavesdroppersPhysical layer securityQuantization schemesUniversal software radio peripheral (USRP)Vector quantization
ISSN
1556-6013
Abstract
In this paper, we propose a secret group-key generation scheme in physical layer, where an arbitrary number of multi-antenna LNs (LN) exist in mesh topology with a multi-antenna passive eavesdropper. In the first phase of the scheme, pilot signals are transmitted from selected antennas of all nodes and each node estimates channels linked to it. In the second phase, each node sequentially broadcasts a weighted combination of the estimated channel information using selected coefficients. The other LNs can obtain the channel information used for group-key generation while the eavesdropper cannot. Each node then can generate a group key by quantizing and encoding the estimated channels into keys. We apply well-known quantization schemes such as scalar and vector quantizations, and compare their performance. To further enhance the keygeneration performance, we also provide how to determine the antennas at each node used for group-key generation and the coefficients used in the broadcast phase. The simulation results verify the performance of the proposed secret group-key generation scheme using various key-related metrics. We also verify the practical robustness of our scheme by implementing a testbed using universal software radio peripheral (USRP). After generating secret common key among 3 nodes, we also test it using the National Institute of Standards and Technology (NIST) test suit. The generated key passes the test and it is random enough for communication secrecy. IEEE
URI
http://hdl.handle.net/20.500.11750/6556
DOI
10.1109/TIFS.2018.2837661
Publisher
Institute of Electrical and Electronics Engineers Inc.
Related Researcher
  • Author Lee, Jemin ISC(Information Security and Communication) Lab
  • Research Interests Wireless Communication System; Information Security
Files:
There are no files associated with this item.
Collection:
Department of Information and Communication EngineeringISC(Information Security and Communication) Lab1. Journal Articles


qrcode mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE