1. A Lightweight and Efficient Physical Layer Key Generation Mechanism for MANETs
- Author
-
Wenjie Du, Weijiang Liu, Ruiwen Wu, Furui Zhan, and Xiaomiao Gao
- Subjects
Key generation ,Computer science ,Universal hashing ,business.industry ,05 social sciences ,Physical layer ,050801 communication & media studies ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Shared secret ,0508 media and communications ,Channel state information ,0202 electrical engineering, electronic engineering, information engineering ,Bit error rate ,Low-density parity-check code ,business ,Communication channel ,Computer network - Abstract
Due to the reciprocity of wireless channels, the communication parties can directly extract the shared key from channel. This solution were verified through several schemes. However, in real situations, channel sampling of legitimate transceivers might be impacted by noises and other interferences, which makes the channel states obtained by initiator and responder might be obvious different. The efficiency and even availability of physical layer key generation are thus reduced. In this paper, we propose a lightweight and efficient physical layer key generation scheme, which extract shared secret keys from channel state information (CSI). To improve the key generation process, the discrete cosine transform (DCT) is employed to reduce differences of channel states of legitimate transceivers. Then, these outputs are quantified and encoded through multi-bit adaptive quantization(MAQ) quantizer and gray code to generate binary bit sequence, which can greatly reduce the bit error rate. Moreover, the low density parity check (LDPC) code and universal hashing functions are used to achieve information reconciliation and privacy amplifification. By adding preprocessing methods in the key generation process and using the rich information of CSI, the security of communications can be increased on the basis of improving the key generation rate. To evaluate this scheme, a number of experiments in various real environments are conducted. The experimental results show that the proposed scheme can effificiently generate shared secret keys for nodes and protect their communication.
- Published
- 2020
- Full Text
- View/download PDF