Title | A Lightweight and Efficient Physical Layer Key Generation Mechanism for MANETs |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Gao, Xiaomiao, Du, Wenjie, Liu, Weijiang, Wu, Ruiwen, Zhan, Furui |
Conference Name | 2020 IEEE 6th International Conference on Computer and Communications (ICCC) |
Keywords | channel reciprocity, channel state information, compositionality, discrete cosine transform, discrete cosine transforms, key generation, manet privacy, Metrics, parity check codes, Physical layer, pubcrawl, Reflective binary codes, Resiliency, transceivers, Wireless communication |
Abstract | Due to the reciprocity of wireless channels, the communication parties can directly extract the shared key from channel. This solution were verified through several schemes. However, in real situations, channel sampling of legitimate transceivers might be impacted by noises and other interferences, which makes the channel states obtained by initiator and responder might be obvious different. The efficiency and even availability of physical layer key generation are thus reduced. In this paper, we propose a lightweight and efficient physical layer key generation scheme, which extract shared secret keys from channel state information (CSI). To improve the key generation process, the discrete cosine transform (DCT) is employed to reduce differences of channel states of legitimate transceivers. Then, these outputs are quantified and encoded through multi-bit adaptive quantization(MAQ) quantizer and gray code to generate binary bit sequence, which can greatly reduce the bit error rate. Moreover, the low density parity check (LDPC) code and universal hashing functions are used to achieve information reconciliation and privacy amplifification. By adding preprocessing methods in the key generation process and using the rich information of CSI, the security of communications can be increased on the basis of improving the key generation rate. To evaluate this scheme, a number of experiments in various real environments are conducted. The experimental results show that the proposed scheme can effificiently generate shared secret keys for nodes and protect their communication. |
DOI | 10.1109/ICCC51575.2020.9345082 |
Citation Key | gao_lightweight_2020 |