Skip to main content

Poster: Key Generation Scheme Based on Physical Layer

  • Conference paper
  • First Online:
Applied Cryptography and Network Security Workshops (ACNS 2022)

Abstract

Key generation from the randomness of wireless channels is a promising technology for the establishment of cryptographic keys between any two users. This paper introduces the wireless key generation technology based on physical layer. Aiming at the shortcomings of the existing key generation scheme, we have done optimization work in the quantization algorithm and preprocessing. We design an iterative lossless quantization algorithm, which is a multi-round lossless quantization algorithm to make full use of the collected measurements. To enhance the randomness of the generated keys, an adaptive quantization algorithm is designed, which enlarges the quantization intervals in the quantization algorithm. In addition, according to the characteristics of the measurements of static and dynamic scenario, we adopt suitable filtering methods for the respective scenario. At last we concludes with some suggestions for future studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jorswieck, E., Tomasin, S., Sezgin, A.: Broadcasting into the uncertainty: authentication and confidentiality by physical-layer processing. Proc. IEEE 103(10), 1702–1724 (2015)

    Article  Google Scholar 

  2. Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., Di Renzo, M.: Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20–27 (2015)

    Article  Google Scholar 

  3. Zhang, J., Rajendran, S., Sun, Z., Woods, R., Hanzo, L.: Physical layer security for the internet of things: authentication and key generation. IEEE Wirel. Commun. 26(5), 92–98 (2019)

    Article  Google Scholar 

  4. Zhao, H., Zhang, Y., Huang, X., Xiang, Y.: An adaptive physical layer key extraction scheme for smart homes. In: Proceedings of 2019 IEEE International Conference On Trust, Security and Privacy in Computing and Communications/ IEEE International Conference On Big Data Science and Engineering, pp. 499–506 (2019)

    Google Scholar 

  5. Zhao, H., Zhang, Y., Huang, X., Xiang, Y.: An adaptive secret key establishment scheme in smart home environments. In: Proceedings of 2019 IEEE International Conference on Communications, pp. 1–6 (2019)

    Google Scholar 

  6. Zhao, H., Zhang, Y., Huang, X., Xiang, Y., Su, C.: A physical-layer key generation approach based on received signal strength in smart homes. IEEE Internet Things J. 9(7), 4917–4927 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunhua Su .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, H., Su, C. (2022). Poster: Key Generation Scheme Based on Physical Layer. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2022. Lecture Notes in Computer Science, vol 13285. Springer, Cham. https://doi.org/10.1007/978-3-031-16815-4_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-16815-4_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-16814-7

  • Online ISBN: 978-3-031-16815-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics