Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation

نویسندگان

  • René Guillaume
  • Andreas Mueller
  • Christian T. Zenger
  • Christof Paar
  • Andreas Czylwik
  • Robert Bosch
چکیده

The generation of symmetric cryptographic keys out of wireless channel properties represents a promising approach for the establishment of secured communication links. Despite the tremendous number of different channel-based key generation protocols, there is little research on security evaluation and fair comparison of those systems. We present suitable metrics and a source model for a security evaluation of quantization schemes for physical layer security systems. By analyzing recent key generation techniques, we evaluate performances and security tradeoffs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generation of Secret Key for Physical Layer to Evaluate Channel Characteristics in Wireless Communications

This manuscript aims to generate a secret key for a PHY layer to evaluate the channel characteristics in wireless communications. An algorithmic approach is adopted for multimedia encryption to generate a secret key between two entities communicating with each other in a real time simulation environment such as MATLAB. Two classes of PHY key generation schemes are analyzed for designing the alg...

متن کامل

Security Analysis of Quantization Schemes for Channel-based Key Extraction

The use of reciprocal and random properties of wireless channels for the generation of secret keys is a highly attractive option for many applications that operate in a mobile environment. In recent years, several practice-oriented protocols have been proposed, but unfortunately without a sufficient and consistent security analysis and without a fair comparison between each other. This can be a...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

A prototyping methodology for SDN-controlled LTE using SDR

In this demo, we present a software and hardware platform for designing services in the next generation of wireless networks, in which SDN and SDR are expected to play a key role. We use a LabVIEW-based PXI platform in which LTE-like SISO OFDM PHY Layer is integrated with an open source protocol stack. Such platform can be easily used within an SDN framework to prototype PHY/MAC cross-layer alg...

متن کامل

Performance Evaluation of MB-OFDM based UWB System

This paper investigates the Multi-band OFDM (MB-OFDM) based physical (PHY) layer proposal for IEEE 802.15.3a working group on short-range high data-rate Ultra-wide-Band (UWB) communications. An overview of the MB-OFDM PHY layer architecture with its various parameters is presented and the optimal choice of critical parameters is discussed. Next, we derive the theoretical un-coded Bit Error Rate...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014