Application cases of secret key generation in communication nodes and terminals

Abstract :

The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectives for future implantations into existing and next-generation radio standards.

Complete list of metadatas

https://hal.telecom-paristech.fr/hal-02287667
Contributor : Telecomparis Hal <>
Submitted on : Friday, September 13, 2019 - 5:12:23 PM
Last modification on : Thursday, October 17, 2019 - 12:37:01 PM

Identifiers

  • HAL Id : hal-02287667, version 1

Citation

Alain Sibille, François Delaveau, Christiane L. Kameni Ngassa, Renaud Molière, Taghrid Mazloum, et al.. Application cases of secret key generation in communication nodes and terminals. Trusted Communications with Physical Layer Security for 5G and Beyond, IET, 2017. ⟨hal-02287667⟩

Share

Metrics

Record views

9