scholarly journals Experimental Study on Key Generation for Physical Layer Security in Wireless Communications

IEEE Access ◽  
2016 ◽  
Vol 4 ◽  
pp. 4464-4477 ◽  
Author(s):  
Junqing Zhang ◽  
Roger Woods ◽  
Trung Q. Duong ◽  
Alan Marshall ◽  
Yuan Ding ◽  
...  
2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Edith Annette Cabrera-Hernández ◽  
Josep Parron ◽  
Alan Tennant

Dynamic directional modulation (DDM) has already proven to be an efficient technique to achieve physical layer security in wireless communications. System architectures based on vector modulators provide a flexible framework to implement synthesis methods that allow us to obtain increased security and/or independent multichannel transmissions. However, the implementation of DDM with vector modulators requires an accurate calibration (amplitude and phase) of every component in the RF path. In this contribution, we study the sensitivity of the response of a DDM system based on commercial vector modulators showing how to correct the nonideal behavior of all the components thanks to the flexibility provided by the vector modulator.


Author(s):  
Rajesh K. Sharma

This chapter provides a survey of physical layer security and key generation methods. This includes mainly an overview of ongoing research in physical layer security in the present and next generation communication networks. Although higher layer security mechanisms and protocols address wireless security challenges in large extent, more security vulnerabilities arise due to the increasingly pervasive existence of wireless communication devices. In this context, the focus of this chapter is mainly on physical layer security. Some security attacks in general are briefly reviewed. Models of physical layer security, information theoretic works, and key generation methods including quantization and reconciliation are discussed. Some latest developments for enhanced security like Multiple-Input Multiple-Output (MIMO) systems, reconfigurable antennas, and multiple relay systems are also presented. Finally, some existing and emerging application scenarios of physical layer security are discussed.


Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 497 ◽  
Author(s):  
Guyue Li ◽  
Chen Sun ◽  
Junqing Zhang ◽  
Eduard Jorswieck ◽  
Bin Xiao ◽  
...  

The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.


Author(s):  
Marco Zoli ◽  
André Noll Barreto ◽  
Stefan Köpsell ◽  
Padmanava Sen ◽  
Gerhard Fettweis

2021 ◽  
pp. 1-1
Author(s):  
Yating Wu ◽  
Yan Yu ◽  
Yuanfeng Hu ◽  
Yanzan Sun ◽  
Tao Wang ◽  
...  

Author(s):  
Rushan Lin ◽  
Li Xu ◽  
He Fang ◽  
Chuan Huang

AbstractWireless communications between two devices can be protected by secret keys. However, existing key generation schemes suffer from the high bit disagreement rate and low bit generation rate. In this paper, we propose an efficient physical layer key generation scheme by exploring the Received Signal Strength (RSS) of signals. In order to reduce the high mismatch rate of the measurements and to increase the key generation rate, a pair of transmitter and receiver separately apply adaptive quantization algorithm for quantifying the measurements. Then, we implement a randomness extractor to further increase key generation rate and ensure randomness of generated of keys. Several real-world experiments are implemented to verify the effectiveness of the proposed scheme. The results show that compared with the other related schemes, our scheme performs better in bit generation rate, bit disagreement rate, and randomness.


Sign in / Sign up

Export Citation Format

Share Document