Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing
In wireless communication systems, the conventional secret key exchange is based on the public key cryptography, which requires complex computations to retain the secrecy level of these key bits. The proposed physical layer-based algorithms have shown promising performance to extract secret keys fro...
        Saved in:
      
    
          | Published in | IET information security Vol. 11; no. 1; pp. 1 - 7 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
            The Institution of Engineering and Technology
    
        01.01.2017
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1751-8709 1751-8717  | 
| DOI | 10.1049/iet-ifs.2014.0530 | 
Cover
| Summary: | In wireless communication systems, the conventional secret key exchange is based on the public key cryptography, which requires complex computations to retain the secrecy level of these key bits. The proposed physical layer-based algorithms have shown promising performance to extract secret keys from the privately shared randomness relying on the reciprocal channel state between both communicated nodes. In this study, the authors propose a physical layer key exchange method which transmits the key bits by encoding them within some phase randomisation (PR) sequences that are privately indexed to a specific channel criterion. The PR sequences only randomise the data phases and thus no efficiency reduction will be incurred. In fact, by choosing a pool of randomisation sequences with certain statistical properties, they could also be used to condition the signal to meet physical layer transmission requirements such as bandwidth, envelope and so on. They quantify the potential of the proposed method by demonstrating it within the context of a multiple-input multiple-output orthogonal frequency division multiplexing system. The results reveal that, relative to existing techniques, the proposed method offers superior key error rate performance at lower computational complexity with better secrecy level. | 
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23  | 
| ISSN: | 1751-8709 1751-8717  | 
| DOI: | 10.1049/iet-ifs.2014.0530 |