Secure key management for 5G physical layer security
Title | Secure key management for 5G physical layer security |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Mazin, A., Davaslioglu, K., Gitlin, R. D. |
Conference Name | 2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON) |
ISBN Number | 978-1-5090-4375-0 |
Keywords | 5G mobile communication, Communication system security, Correlation, diversity order, eavesdropping channels, error statistics, Human Behavior, Key Management, LDPC, LDPC codes, legitimate communication parties, legitimate receiver, legitimate transmitter, legitimate users, low density parity check codes, Metrics, mobility management (mobile radio), Network security, next generation 5G wireless networks, parity check codes, passive eavesdropper, Physical layer, physical layer security, pubcrawl, resilience, Resiliency, Scalability, secure key management, Signal to noise ratio, telecommunication security, unsecured wireless medium, very high error probability, Wireless communication, wiretap channel |
Abstract | Next generation 5G wireless networks pose several important security challenges. One fundamental challenge is key management between the two communicating parties. The goal is to establish a common secret key through an unsecured wireless medium. In this paper, we introduce a new physical layer paradigm for secure key exchange between the legitimate communication parties in the presence of a passive eavesdropper. The proposed method ensures secrecy via pre-equalization and guarantees reliable communications by the use of Low Density Parity Check (LDPC) codes. One of the main findings of this paper is to demonstrate through simulations that the diversity order of the eavesdropper will be zero unless the main and eavesdropping channels are almost correlated, while the probability of key mismatch between the legitimate transmitter and receiver will be low. Simulation results demonstrate that the proposed approach achieves very low secret key mismatch between the legitimate users, while ensuring very high error probability at the eavesdropper. |
URL | http://ieeexplore.ieee.org/document/7930246/ |
DOI | 10.1109/WAMICON.2017.7930246 |
Citation Key | mazin_secure_2017 |
- Scalability
- next generation 5G wireless networks
- parity check codes
- passive eavesdropper
- Physical layer
- physical layer security
- pubcrawl
- resilience
- Resiliency
- network security
- secure key management
- Signal to noise ratio
- telecommunication security
- unsecured wireless medium
- very high error probability
- Wireless communication
- wiretap channel
- LDPC codes
- Communication system security
- Correlation
- diversity order
- eavesdropping channels
- error statistics
- Human behavior
- key management
- LDPC
- 5G mobile communication
- legitimate communication parties
- legitimate receiver
- legitimate transmitter
- legitimate users
- low density parity check codes
- Metrics
- mobility management (mobile radio)