Group Secret-Key Generation Using Algebraic Rings in Wireless Networks

نویسندگان

چکیده

It is well known that physical-layer Group Secret-Key (GSK) generation techniques allow multiple nodes of a wireless network to synthesize common secret-key, which can be subsequently used keep their group messages confidential. As one its salient features, the involved in GSK extract randomness from subset channels, referred as source (CSR). Unlike two-user key generation, some must act facilitators by broadcasting quantized versions linear combinations channel realizations, so assist all observe CSR. However, we note combination realizations incurs non-zero leakage CSR an eavesdropper, and moreover, quantizing also reduces overall key-rate. Identifying these issues, propose practical protocol, Algebraic Symmetrically Quantized (A-SQGSK) three nodes, wherein due quantization symbols at facilitator, other two quantize use them appropriately over algebraic rings generate keys. First, prove A-SQGSK protocol zero eavesdropper. Subsequently, on provided consensus algorithm among called Entropy-Maximization Error-Minimization (EM-EM) algorithm, maximizes entropy secret-key subject upper-bound mismatch-rate. We extensive analysis simulation results lay out guidelines jointly choose parameters EM-EM algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret Key Generation for Fading Wireless Channel

The multipath-rich wireless atmosphere allied with typical wireless usage scenarios is characterized by a vanishing channel retort that is time-varying, location-sensitive, and only shared by a given transmitter–receiver pair. The complexity allied with a highly scattering atmosphere implies that the short-term vanishing process is intrinsically hard to envisage and best modeled stochastically,...

متن کامل

A survey on secret key generation mechanisms on the physical layer in wireless networks

Traditional security mechanisms are mainly based on the distribution of shared secret keys. Yet, this task is non trivial in large wireless networks, due to mobility and scalability issues. Recently, it has been found that some properties of the physical layer of wireless communications can be leveraged for the purpose of secret key generation. In particular, the wireless channel has been inves...

متن کامل

Poster: Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks

Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on single-antenna systems. Multiple-antenna devices have the potential to provide more randomness for key generation than single-antenna ones. However, the performance of key generation using multiple-antenna devices in a rea...

متن کامل

Algebraic Elements in Group Rings

In this brief note, we study algebraic elements in the complex group algebra C[G]. Specifically, suppose £ e C[G] satisfies /(£) = 0 for some nonzero polynomial f(x) e C[x]. Then we show that a certain fairly natural function of the coefficients of Z is bounded in terms of the complex roots of f(x). For G finite, this is a recent observation of [HLP], Thus the main thrust here concerns infinite...

متن کامل

Key Establishment Using Group Information for Wireless Sensor Networks

Wireless sensor networks are commonly used for critical security tasks such as intrusion or tamper detection, and therefore must be protected. To date, security of these networks relies mostly on key establishment and routing protocols. We present a new approach to key establishment, which combines a group-based distribution model and identity-based cryptography. Using this solution enables sen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Vehicular Technology

سال: 2021

ISSN: ['0018-9545', '1939-9359']

DOI: https://doi.org/10.1109/tvt.2021.3054031