Quantization and LLR Computation for Physical Layer Security
نویسندگان
چکیده
While computational security algorithms usually reside in upper protocol layers and rely on the assumption of limited processing capabilities of a potential eavesdropper, physicallayer key generation aims at providing secrecy in the more information-theoretic sense, as introduced by Shannon [?]. Thus, by sharing a previously known secret key, such as a one-time pad, two legitimate users, Alice and Bob, are able to exchange an encrypted message through an unsafe public channel, without leaking any information to a potential eavesdropper, Eve. As long as Alice and Bob share a secret common source of randomness from which they can generate a long uniformly distributed secret key, perfect secrecy is achieved, meaning that Eve has the same chances of guessing the original message with or without the ciphertext, or, in more theoretical terms, the eavesdropper’s equivocation is equal to the entropy of the message. It soon became clear that such a common source of randomness could be provided by the fluctuating and reciprocal nature of the wireless medium and the channel-state information (CSI) can be measured by both Alice and Bob and used to generate one-time pads, thus eliminating the problem of previous key distribution. Since most wireless transmission standards, such as 802.11, Bluetooth, WiMAX, ZigBee, employ time division duplexing (TDD), probing in consecutive short time slots the forward and the reverse channel providing the possibility of obtaining nearly identical CSI on both sides. An eavesdropper located a few wavelengths away from any of the legitimate users, and passively listening to the probing, will experience independent channels [9]. Such a method of key generation, solely based on the reciprocity property of wireless TDD systems, besides solving the problem of key distribution, comes with the significant benefit that it does not require the legitimate channel between Alice and Bob to have an SNR advantage over the eavesdropper’s channels, such as [?], [?], nor does it assume Alice and Bob to have information about the channels to Eve. However, one important aspect that we address here is that due to independent noise on both ends, different transceiver circuitry, and quantization errors, key mismatches are very likely to occur, leading to the necessity Fig. 1. System model key reconciliation based on LDPC codes
منابع مشابه
Physical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes
PHYSICAL LAYER SECRET KEY AGREEMENT USING ONE-BIT QUANTIZATION AND LOW-DENSITY PARITY-CHECK CODES John A. Snoap Old Dominion University, 2016 Director: Dr. Dimitrie C. Popescu Physical layer approaches for generating secret encryption keys for wireless systems using channel information have attracted increased interest from researchers in recent years. This paper presents a new approach for cal...
متن کاملQuantization Aspects in LDPC Key Reconciliation for Physical Layer Security
For physical-layer security, key reconciliation procedures are needed to correct key differences that can arise as a consequence of independent noise at the two ends of a reciprocal link. We assume either a random link in a mobile environment or use reconfigurable antenna elements to randomize the channel, such that it allows for frequent key generation. We apply LDPC codes to reconcile the key...
متن کاملPhysical Layer Security and Its Applications : A Survey
This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pe...
متن کاملFair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation
The generation of symmetric cryptographic keys out of wireless channel properties represents a promising approach for the establishment of secured communication links. Despite the tremendous number of different channel-based key generation protocols, there is little research on security evaluation and fair comparison of those systems. We present suitable metrics and a source model for a securit...
متن کاملDetection of perturbed quantization (PQ) steganography based on empirical matrix
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015