A Review of Challenges and Developments in Wireless Channel Key Generation Technology
DOI:
https://doi.org/10.62051/4ht6an98Keywords:
Wireless channel key generation; Quasi-stationary channel; anti-interference.Abstract
In recent years, physical layer security has become one of the core technologies for wireless communication system security. Physical layer encryption is based on the inherent reciprocity, time-varying, spatial uniqueness and unpredictability of wireless communication systems to generate keys, which are naturally unforgeable and steganography-proof. However, the research of physical layer key generation technology also faces many challenges, such as the problem of poor key generation performance due to signal interference, the problem of lower randomness and slower key generation rate in quasi-static channel environment, and the problem of lower key consistency between two legitimate communication parties due to the existence of channel estimation errors; this paper provides a systematic explanation of the traditional model of key generation for wireless channels and a typical solution for this series of problems. In this paper, the traditional model of wireless channel key generation is systematically explained, and the typical solutions to this series of problems are studied, analysed and compared in terms of performance.
Downloads
References
[1] Shannon C E. Communication theory of secrecy systems[J]. The Bell system technical journal, 1949, 28(4):656-715.
[2] Maurer U M. Secret key agreement by public discussion from common information[J]. IEEE transactions oninformation theory, 1993, 39(3): 733-742.
[3] Hershey J E, Hassan A A, Yarlagadda R. Unconventional cryptographic keying variable management[J]. IEEE Transactions on Communications, 1995, 43(1): 3-6.
[4] Premnath, Sriram, Nandha, et al. Secret key extraction from wireless signal strength in real environments [J]. IEEE Transactions on Mobile Computing,2013,12(5):917-930.
[5] Youssef E H S, Hogrefe D. An optimal guard-intervals based mechanism for key generation from multipath wireless channels[A]. IEEE International Conference on New Technologies, Mobility and Security[C], 2011:1-5.
[6] Ohira T. Secret key generation exploiting antenna beam steering and wave propagation reciprocity [A]. European Microwave Conference[C], Paris, France,2005:23-27.
[7] Wang Q,Xu K, Ren K. Cooperative secret key generation from phase estimation in narrowband fading channels [J]. IEEE Journal on Selected Areas in Communications, 2012, 30(9): 1666-1674.
[8] S. Jana, S. N. Premnath, M. Clark, et al. On the effectiveness of secret key extraction from wireless signal strength in real environments[C]. Proceedings of the 15th annual international conference on Mobile computing and networking. ACM, Beijing, China, 2009, 321-332.
[9] Long Jiao, Tang Jie, Zeng Kai. Physical Layer Key Generation Using Virtual AoA and AoD of mmWave MassiveMIMOChannel[A]. IEEE Conference on Communications and Network Security[C],2018:1-9.
[10] C. E. Shannon.Communication Theory of Secrecy Systems*[J].Bell System Technical Journal,1949(4).
[11] LI Gu Yue,HU Ai Qun. Wireless channel key extraction method based on K-L transform[J]. Journal of Southeast University: natural science edition, 2017, 47(2):6
[12] Margelis G, Fafoutis X, Oikonomou G, et al. Physical layer secret-key generation with discreet cosinetransform for the Internet of Things[C]2017 IEEE international conference on communications (ICC). IEEE,2017: 1-6.
[13] Youssef E H S, Hogrefe D. An optimal guard-intervals based mechanism for key generation from multipath wireless channels[C]2011 4th IFIP International Conference on New Technologies,Mobility and Security. IEEE, 2011:1-5.
[14] Cai, W.-B. Research on the theoretical limit and quantitative method of generating keys based on wireless channel characteristics[D]. Henan:PLA Information Engineering University,2013.
[15] Yasukawa S, Iwai H, and Sasaoka H. A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property [A]. IEEE International Symposium on Information Theory[C], Toronto, Canada, 2008:732-736.
[16] Dai Peak, Jin Liang, Huang Kaizhi. Design of adaptive key generation scheme based on channel feature quantisation[J]. Journal of Communication,2014,35(1):191-197.
[17] Liu Jingmei, Han Qingqing, Shen Zhiwei,et al. Physical layer key generation scheme using k-mean clustering[J]. Journal of Xi'an Electronic Science and Technology University,2019,46(1):6.
[18] Zhu X, Xu F, Novak E, et al. Extracting secret key from wireless link dynamics in vehicular environments[C]IEEE INFOCOM. ieee, 2013:2283-2291.
[19] Bai E, Jiang X, Wu Y. Memory-Saving and High-Speed Privacy Amplification Algorithm UsingLFSR-Based Hash Function for Key Generation[J]. Electronics, 2022, 11(3):377.
[20] Yasukawa S,Iwai H,Sasaoka H.Adaptive key generation in secret key agreement scheme basedon the channel characteristics in OFDM[C]2008 International Symposium on InformationTheory and Its Applications.IEEE,2008:1-6.
[21] Huang Y,Zhou S,Shie Z,et al.Channel frequency response-based secret key generation inunderwater acoustic systems[J].IEEE Transactions on Wireless Communications,2016,15(9):5875-5888.
[22] Longwang Cheng,Wei Li and Dongtang Ma.Secret Key Generation via Random Beamforming in Stationary Environment [C].International Conference on Wireless Communications & Signal Processing (WCSP),2015:1-5.
[23] Tang W,Chen X,Chen M Z,et al.On channel reciprocity in reconfigurable intelligent surface assistedwireless networks[J].IEEE Wireless Communications,2021,28(6):94-101.
Downloads
Published
Conference Proceedings Volume
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







