Skip to main content

Advertisement

Log in

A wireless secret key generation method based on Chinese remainder theorem in FDD systems

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

The wireless physical channel parameters are recently used to provide secret key. However, the key generation usually suffers from the quantization errors due to the noise, which decreases the key agreement ratio (KAR) between authorized users. Most existing approaches achieve high KAR by discarding some channel parameters which may lower the key generation efficiency and therefore lower the encryption strength. In the frequency-division duplex (FDD) systems, the number of reciprocal parameters, such as the multipath angle and delay, is limited. Therefore how to find a quantization method with high KAR and encryption strength is one of the major problems for secret key generation in FDD systems. In this paper, a robust quantization scheme based on grouping and shifting is proposed, in which all the available parameters are used for key generation. In addition, a key mapping method with error correction based on Chinese remainder theorem (CRT) is proposed to further improve the KAR performance. Simulations demonstrate the effectiveness of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Li X H, Hwu J, Ratazzi E P. Using antenna array redundancy and channel diversity for secure wireless transmissions. J Commun, 2007, 2: 24–32

    Google Scholar 

  2. Sayeed A, Perrig A. Secure wireless communications: Secret keys through multipath. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’08), 2008. 3013-3016

  3. Wallace J, Sharma R K. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis. IEEE Trans Inform Forens Secur, 2010, 5: 381–391

    Article  Google Scholar 

  4. Wallace J. Secure physical layer key generation schemes: performance and information theoretic limits. In: Proceedings of IEEE ICC, Dresden, 2009. 1-5

  5. Aono T, Higuchi K, Ohira T, et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Trans Anten Propag, 2005, 53: 3776–3784

    Article  Google Scholar 

  6. Czylwik, A. Downlink beamforming for mobile radio systems with frequency division duplex. In: Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2000. 72–76

  7. Steinbauer M, Molisch A F, Bonek E. The double-directional radio channel. IEEE Anten Propag, 2001, 43: 51–63

    Article  Google Scholar 

  8. Liang Y C, Chin F, Kot A. Downlink channel covariance matrix (DCCM) estimation for FDD SDMA. In: Proceedings of IEEE Vehicular Technology Conference, 2002. 2382–2386

  9. Goldreich O, Ron D, Sudan M. Chinese Remaindering with Errors. IEEE Trans Inform Theory, 2000, 46: 1330–1338

    Article  MathSciNet  MATH  Google Scholar 

  10. Mandelbaum D M. On a class of arithmetic codes and a decoding algorithm. IEEE Trans Inform Theory, 1976, 1: 85–88

    Article  MathSciNet  Google Scholar 

  11. Wang J Z, Milstein L B. CDMA overlay situations for microcellular mobile communications. IEEE Trans Commun, 1995, 43: 603–614

    Article  Google Scholar 

  12. Wang J Z, Chen J. Performance of wideband CDMA with complex spreading and imperfect channel estimation. IEEE J Sel Area Commun, 2001, 19: 152–163

    Article  Google Scholar 

  13. Raleigh G C, Paulraj A. Time varying vector channel estimation for adaptive spatial equalization. In: Proceedings of IEEE Globecom, 1995. 218–224

  14. 3GPP. Spatial channel model for Multiple Input Multiple Output (MIMO) simulations (Rel.6). TR 25.996.V6.1.0. 2003

  15. Ding C, Pei D, Salomaa A. Chinese remainder theorem: applications in computing, coding, cryptography. World Scientif, 1999

  16. Wang W J, Xia X G. A closed-form robust Chinese remainder theorem and its performance analysis. IEEE Trans Signal Process, 2010, 58: 5655–5666

    Article  MathSciNet  Google Scholar 

  17. Chan H, Perrig A, Song D, Random key predistribution schemes for sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy, 2003. 197-213

  18. Alle-Jan van der Veen, Vanderveen M, Paulraj A. Joint angle and delay estimation using shift-invariance techniques. IEEE Trans Signal Process, 1998, 46: 405–418

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to WenJie Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, W., Jiang, H., Xia, X. et al. A wireless secret key generation method based on Chinese remainder theorem in FDD systems. Sci. China Inf. Sci. 55, 1605–1616 (2012). https://doi.org/10.1007/s11432-012-4570-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-012-4570-2

Keywords