Skip to main content
Top

2015 | OriginalPaper | Chapter

44. Compressed Sensing Method for Secret Key Generation Based on MIMO Channel Estimation

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In searching for alternative solutions of secret key generation in wireless networks, many physical-layer-based methods have been proposed. These methods exploit the inherent randomness and reciprocity of the multipath fading channel to generate secret keys. Multiple-antenna system provide higher key bit generation rate than single-antenna one because of more channel randomness. However, traditional MIMO key generation schemes produce prohibitively high bit mismatch. To address the tradeoff between key bit generation rate and key agreement probability, we propose a compressed sensing (CS) method for key generation in single carrier MIMO sparse multipath channel. Theory analysis shows that the CS-based key generation scheme provides high entropy key bits from fewer probes. Performance simulation reveals the proposed scheme achieves a high key agreement probability at a high key generation rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Limmanee A, Henkel W (2010) Secure physical-layer key generation protocol and key encoding in wireless communications. In: GLOBECOM workshops IEEE, pp 94–98 Limmanee A, Henkel W (2010) Secure physical-layer key generation protocol and key encoding in wireless communications. In: GLOBECOM workshops IEEE, pp 94–98
2.
go back to reference Ren K, Su H, Wang Q (2011) Secret key generation exploiting channel characteristics in wireless communications. Wirel Commun IEEE 18(4):6–12CrossRef Ren K, Su H, Wang Q (2011) Secret key generation exploiting channel characteristics in wireless communications. Wirel Commun IEEE 18(4):6–12CrossRef
3.
go back to reference Kai Z, Wu D, An C, Mohapatra P (2010) Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In: Proceedings of INFOCOM’10, pp 1837–1845 Kai Z, Wu D, An C, Mohapatra P (2010) Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In: Proceedings of INFOCOM’10, pp 1837–1845
4.
go back to reference Wallace JW, Sharma RK (2010) Experimental investigation of MIMO reciprocal channel key generation. Communications (ICC) IEEE international conference IEEE, pp 1–5 Wallace JW, Sharma RK (2010) Experimental investigation of MIMO reciprocal channel key generation. Communications (ICC) IEEE international conference IEEE, pp 1–5
5.
go back to reference Bajwa WU, Haupt J, Sayeed AM, Nowak R (2010) Compressed channel sensing: a new approach to estimating sparse multipath channels. Proc IEEE 98(6):1058–1076CrossRef Bajwa WU, Haupt J, Sayeed AM, Nowak R (2010) Compressed channel sensing: a new approach to estimating sparse multipath channels. Proc IEEE 98(6):1058–1076CrossRef
6.
go back to reference Jana S, Premnath SN, Clark M et al (2009) On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th annual international conference on mobile computing and networking ACM, pp 321–332 Jana S, Premnath SN, Clark M et al (2009) On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th annual international conference on mobile computing and networking ACM, pp 321–332
7.
go back to reference Suhas M, Narayan M, Chunxuan Y, Alex R (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM international conference on mobile computing and networking. ACM, pp 128–139 Suhas M, Narayan M, Chunxuan Y, Alex R (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM international conference on mobile computing and networking. ACM, pp 128–139
8.
go back to reference Babak A, Alejandra M, Bulent Y et al (2007) Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 401–410 Babak A, Alejandra M, Bulent Y et al (2007) Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, pp 401–410
9.
go back to reference Gilles B, Louis S (1994) Secret key reconciliation by public discussion. Lect Notes Comput Sci 765:410–423 Gilles B, Louis S (1994) Secret key reconciliation by public discussion. Lect Notes Comput Sci 765:410–423
10.
go back to reference Impagliazzo R, Leonid AL, Michael L (1989) Pseudo-random generation from one-way functions. In: Proceedings of the twenty-first annual ACM symposium on theory of computing. ACM, pp 12–24 Impagliazzo R, Leonid AL, Michael L (1989) Pseudo-random generation from one-way functions. In: Proceedings of the twenty-first annual ACM symposium on theory of computing. ACM, pp 12–24
11.
go back to reference Needell D, Joel AT (2009) CoSaMP: iterative signal recovery from incomplete and inaccurate samples. Appl Comput Harmon Anal 26(3):301–321MATHMathSciNetCrossRef Needell D, Joel AT (2009) CoSaMP: iterative signal recovery from incomplete and inaccurate samples. Appl Comput Harmon Anal 26(3):301–321MATHMathSciNetCrossRef
Metadata
Title
Compressed Sensing Method for Secret Key Generation Based on MIMO Channel Estimation
Authors
Yuqi Li
Ting Jiang
Jingjing Huang
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-08991-1_44