Physical layer key generation methods for arbitrary fading channels

RK Sharma, JW Wallace - 2011 IEEE International Symposium …, 2011 - ieeexplore.ieee.org
Two methods are developed that can be applied to generate secret keys automatically from
fading propagation channels that are reciprocal but have arbitrary (ie non Gaussian) …

Secret key generation based on aoa estimation for low snr conditions

A Badawy, T Khattab, T El-Fouly… - 2015 IEEE 81st …, 2015 - ieeexplore.ieee.org
In the context of physical layer security, a physical layer characteristic is used as a common
source of randomness to generate the secret key. Therefore an accurate estimation of this …

Experimental study on key generation for physical layer security in wireless communications

J Zhang, R Woods, TQ Duong, A Marshall, Y Ding… - IEEE …, 2016 - ieeexplore.ieee.org
This paper presents a thorough experimental study on key generation principles, ie,
temporal variation, channel reciprocity, and spatial decorrelation, through a testbed …

Deep Learning‐Based Channel Reciprocity Learning for Physical Layer Secret Key Generation

H He, Y Chen, X Huang, M Xing, Y Li… - Security and …, 2022 - Wiley Online Library
Using the physical layer channel information of wireless devices to establish the highly
consistent secret keys is a promising technology for improving the security of wireless …

Physical-layer secret key generation with correlated eavesdropping channel

H Jin, K Huang, L Jin, Z Zhong… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
Key generation technique generates symmetric keys based on the temporal variation,
reciprocity and spatial decorrelation of the wireless channel. Most key generation schemes …

Enhanced physical layer secure key generation using mm Wave beamforming

NC Manjappa, L Wimmer, N Maletic… - 2022 International …, 2022 - ieeexplore.ieee.org
Secret key generation based on wireless channel reciprocity is a promising area of research
towards ensuring secure wireless communication. In this paper, we propose a method of …

Efficient and secure key extraction using CSI without chasing down errors

J Zhao, W Xi, J Han, S Tang, X Li, Y Liu, Y Gong… - arXiv preprint arXiv …, 2012 - arxiv.org
Generating keys and keeping them secret is critical in secure communications. Due to the"
open-air" nature, key distribution is more susceptible to attacks in wireless communications …

A practical, provably unbreakable approach to physical layer security

AK Khandani, E Bateni - 2019 16th Canadian Workshop on …, 2019 - ieeexplore.ieee.org
This article presents a practical approach for secure key exchange exploiting reciprocity in
wireless transmission. The method relies on the reciprocal channel phase to mask points of …

An upper bound on phy-layer key generation for secure communications over a nakagami-m fading channel with asymmetric additive noise

A Albehadili, K Al Shamaileh, A Javaid, J Oluoch… - IEEE …, 2018 - ieeexplore.ieee.org
The establishment of convenient and reliable cryptographic keys is not always feasible,
especially in low-powered wireless devices where a complex key management …

Physical-Layer Secret Key Generation Based on Bidirectional Convergence Feature Learning Convolutional Network

Y Chen, Z Luo, Z Wang, L Sun, Y Li… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Physical-layer secret key generation (PLKG) is a new research area that has emerged in
recent years. It is aimed at scenarios where legitimate IoT devices communicate directly …