A Survey on Quantization Schemes for Secure Key Generation

Authors

  • U.R. Bhatt
  • R. Sharma Dept. of Electronics and Telecommunication, IET- Devi Ahilya University, Indore, India
  • A. Soni Dept. of Electronics and Telecommunication, IET- Devi Ahilya University, Indore, India
  • R. Upadhyay Dept. of Electronics and Telecommunication, IET- Devi Ahilya University, Indore, India

Keywords:

Secure key generation, Quantization, Key Disagreement Rate (KDR)

Abstract

Secure key generation is one of the promising approach to establish secured link between two legitimate nodes for wireless communication. We established a system, which generate the secret key at the both end of the legitimate node. Secure key generation system contain four major block namely channel estimation, quantization, information reconciliation and privacy amplification, in which quantization is one of the important module. In secured key generation, output of the quantizer will affects the bit mismatch rate significantly. The present paper analyses different quantization schemes to make synchronization between two nodes. By applying key generation technique, we analyze effect of quantization bit on the key disagreement rate.

 

References

A. Badawya, T Elfouly, T Khattab, A Mohamedb, M Guizani, “Unleashing the secure potential of the wireless physical layer: Secret key generation methods”, Physical Communication, Vol. 19, Issue.6, pp. 1-10, 2016.

J. Zhang, T.Q. Duongl, A. marshall, and R. woods, “Key Generation From Wireless Channels: A Review”, IEEE Access, Vol. 4, Issue.1, pp.614-624, 2016 .

C. T. Zenger, J. Zimmer, C. Paar, “Security Analysis of Quantization Schemes for Channel-based Key Extraction”, in proc. Workshop wireless commun. Secur. Phys. Layer, portugal, pp.1-7, 2015

C.T. Zenger, M.J. Chur, J.F. Posielek, C. Parr, “A Novel Key Generating Architecture for Wireless Low-Resource Devices”, International Workshop on Secure Internet of Things, Poland, pp. 26-34, 2014.

S. Mathur, W. Trappe, N.B. Mandayam, C Ye, A. Reznik, “Radio-telepathy: extracting a secret key from an unauthenticated wireless channel”, 14th Annual International Conference on Mobile Computing and Networking, USA, pp 128–139, 2008.

S. Jana, S. N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, “On the effectiveness of secret key extraction from wireless signal strength in real environments”, In the presseding of 15th Annual International Conference on Mobile Computing and Networking, China, pp. 321-332, 2009.

N. Patwari, J. Croft, S. Jana, S.K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements”, IEEE Trans. Mob. Comput., Vol 9, Issue1, pp.17-30, 2010.

A. Ambekar, M. Hassan, H.D. Schotten, “Improving channel reciprocity for effective key management systems”, 2012 International Symposium on In Signals Systems and Electronics (ISSSE), UK, pp.1-4, Oct 2012.

R. Guillaume, A. Mueller, C.T. Zenger, Christof Paar Andreas Czylwik “Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation”, 18th International OFDM Workshop,Germany, pp.1-8, 2014.

X. Wang, L. Thiele, T. Haustein, Y. Wang, “Secret key Generation Using Entropy-Constrained-Like Quantization Scheme ”, 23rd International Conference on Telecommunications (ICT),, China, pp.34-40, 2016

A. Badawy, T. Khattab, T. El-Fouly, A. Mohamed, D. Trinchero, “Secret key Generation based on AOA estimation for low SNR condition”, IEEE 81st vehicular technology conference, VTC sprint, pp. 1-7, 2015

H. Li, L. Chen, “RSSI-Aware Energy Saving For Large File Downloading on Smartphones”, IEEE Emebedded System Letters, Vol. 7, Issue 2, pp.63-66, 2015.

Downloads

Published

2017-06-30

How to Cite

[1]
U. Bhatt, R. Sharma, A. Soni, and R. Upadhyay, “A Survey on Quantization Schemes for Secure Key Generation”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 3, pp. 42–46, Jun. 2017.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.