Group Secret-Key Generation Using Algebraic Rings in Wireless Networks
نویسندگان
چکیده
It is well known that physical-layer Group Secret-Key (GSK) generation techniques allow multiple nodes of a wireless network to synthesize common secret-key, which can be subsequently used keep their group messages confidential. As one its salient features, the involved in GSK extract randomness from subset channels, referred as source (CSR). Unlike two-user key generation, some must act facilitators by broadcasting quantized versions linear combinations channel realizations, so assist all observe CSR. However, we note combination realizations incurs non-zero leakage CSR an eavesdropper, and moreover, quantizing also reduces overall key-rate. Identifying these issues, propose practical protocol, Algebraic Symmetrically Quantized (A-SQGSK) three nodes, wherein due quantization symbols at facilitator, other two quantize use them appropriately over algebraic rings generate keys. First, prove A-SQGSK protocol zero eavesdropper. Subsequently, on provided consensus algorithm among called Entropy-Maximization Error-Minimization (EM-EM) algorithm, maximizes entropy secret-key subject upper-bound mismatch-rate. We extensive analysis simulation results lay out guidelines jointly choose parameters EM-EM algorithm.
منابع مشابه
Secret Key Generation for Fading Wireless Channel
The multipath-rich wireless atmosphere allied with typical wireless usage scenarios is characterized by a vanishing channel retort that is time-varying, location-sensitive, and only shared by a given transmitter–receiver pair. The complexity allied with a highly scattering atmosphere implies that the short-term vanishing process is intrinsically hard to envisage and best modeled stochastically,...
متن کاملA survey on secret key generation mechanisms on the physical layer in wireless networks
Traditional security mechanisms are mainly based on the distribution of shared secret keys. Yet, this task is non trivial in large wireless networks, due to mobility and scalability issues. Recently, it has been found that some properties of the physical layer of wireless communications can be leveraged for the purpose of secret key generation. In particular, the wireless channel has been inves...
متن کاملPoster: Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on single-antenna systems. Multiple-antenna devices have the potential to provide more randomness for key generation than single-antenna ones. However, the performance of key generation using multiple-antenna devices in a rea...
متن کاملAlgebraic Elements in Group Rings
In this brief note, we study algebraic elements in the complex group algebra C[G]. Specifically, suppose £ e C[G] satisfies /(£) = 0 for some nonzero polynomial f(x) e C[x]. Then we show that a certain fairly natural function of the coefficients of Z is bounded in terms of the complex roots of f(x). For G finite, this is a recent observation of [HLP], Thus the main thrust here concerns infinite...
متن کاملKey Establishment Using Group Information for Wireless Sensor Networks
Wireless sensor networks are commonly used for critical security tasks such as intrusion or tamper detection, and therefore must be protected. To date, security of these networks relies mostly on key establishment and routing protocols. We present a new approach to key establishment, which combines a group-based distribution model and identity-based cryptography. Using this solution enables sen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Vehicular Technology
سال: 2021
ISSN: ['0018-9545', '1939-9359']
DOI: https://doi.org/10.1109/tvt.2021.3054031