Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment

The necessity for secured communication devices that has limited computing power has encouraged the development of key generation scheme. The generation of a symmetric key scheme that utilizes randomness of wireless channels offers a most promising solution as a result of the easy distribution of secret key mechanisms. In the last few years, various schemes have been proposed, but there are trade-offs between the performance parameters used. The expected parameters are the low Key Disagreement Rate (KDR), the high Key Generation Rate (KGR), and the fulfillment of standard of randomness. In this paper, we propose the use of a combination of pre-processing methods with multilevel lossy quantization to overcome the trade-off of performance parameters of the Secret Key Generation (SKG) scheme. Pre-process method used to improve reciprocity so as to reduce KDR, whereas multilevel quantization is used to improve the KGR. We use Kalman as the pre-processing method and Adaptive Quantization, Modified Multi-Bit (MMB), and 2-ary Quantization as the multilevel lossy quantization. Testing is conducted by comparing the performance between direct quantization with the addition of the pre-processing method in various multilevel lossy quantization schemes. The test results show that the use of Kalman as pre-processing methods and multilevel lossy quantization can overcome the trade-off performance parameters by reducing KDR and increasing KGR, with the best performance, was obtained when we use adaptive quantization. The resulting secret key has also fulfilled 6 random tests with p values greater than 0.01.

[1]  Xiaojiang Du,et al.  Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems , 2018, J. Sens. Actuator Networks.

[2]  Xiaoming Xu,et al.  Physical layer security in IoT: A spatial-temporal perspective , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[3]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[4]  Parviz Keshavarzi,et al.  Advance hybrid key management architecture for SCADA network security , 2016, Secur. Commun. Networks.

[5]  Christof Paar,et al.  Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.

[6]  Alireza Sadeghi,et al.  Analysis of key generation rate from wireless channel in in-band full-duplex communications , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[7]  Christof Paar,et al.  Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[8]  A. Ambekar,et al.  Improving channel reciprocity for effective key management systems , 2012, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE).

[9]  Parviz Keshavarzi,et al.  Key management issue in SCADA networks: A review , 2017 .

[10]  Abdalhossein Rezai,et al.  Secure Wireless Body Area Network (WBAN) Communication Method Using New Random Key Management Scheme , 2016 .

[11]  Syed Taha Ali,et al.  Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[12]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[13]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[14]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[15]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[16]  Christof Paar,et al.  Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .

[17]  Prasant Mohapatra,et al.  Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.

[18]  Wirawan,et al.  Performance evaluation of the key extraction schemes in wireless indoor environment , 2017, 2017 International Conference on Signals and Systems (ICSigSys).

[19]  Syed Taha Ali,et al.  Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.

[20]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[21]  Vijay Sivaraman,et al.  An experimental study of secret key generation for passive Wi-Fi wearable devices , 2017, 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[22]  A. M. Adeshina,et al.  Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES , 2016, Interdisciplinary Sciences: Computational Life Sciences.

[23]  Christof Paar,et al.  Exploiting the Physical Environment for Securing the Internet of Things , 2015, NSPW '15.

[24]  Y. Pandurangaiah,et al.  Generation of Secret Key for Physical Layer to Evaluate Channel Characteristics in Wireless Communications , 2013, ArXiv.

[25]  Wirawan,et al.  Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment , 2017, Int. J. Commun. Networks Inf. Secur..

[26]  Chen Sun,et al.  High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing , 2018, IEEE Transactions on Communications.

[27]  Xenofon Fafoutis,et al.  Physical layer secret-key generation with discreet cosine transform for the Internet of Things , 2017, 2017 IEEE International Conference on Communications (ICC).

[28]  Jie Huang,et al.  A lightweight physical-layer based security strategy for Internet of things , 2018, Cluster Computing.

[29]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[30]  Junqing Zhang,et al.  Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview , 2017, Entropy.

[31]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[32]  Shengjun Zhang,et al.  Secret key generation based on two-way randomness for TDD-SISO system , 2018, China Communications.

[33]  Abdalhossein Rezai,et al.  An Efficient Method to Improve WBAN Security , 2014 .

[34]  Abhijit Ambekar Exploiting Radio Channel Aware Physical Layer Concepts , 2015 .