Skip to main content

Secrecy Capacity of Symmetric Keys Generated by Quantising Channel Metrics Over a Fading Channel

  • Conference paper
  • First Online:
  • 858 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 98))

Abstract

Physical layer security has become the cornerstone of the wireless communication system. Key generation by channel estimation enables legitimate users to generate keys in a decentralised manner than sharing secret information in open wireless mediums. In this paper we propose secrecy evaluation of symmetric keys which are, generated by channel metrics estimated over the Rayleigh fading channel, encrypted and transmitted over a fading channel in the presence of an eavesdropper. The results are obtained in terms of secrecy capacity and outage probability for various key sizes, different position of eavesdroppers from the source. It is seen that as key size increases and distance of eavesdropper increases from the source the secrecy capacity increases. Also the performance of keys derrived from various channel metrics such as complex channel path gains, EVM rms and complex phase difference are discussed in this paper.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Srividya, L., Sudha, P.N.: Literature survey on recent audıo encryptıon technıques. Int. J. Electron. Commun. Eng. Technol. (IJECET) 7(6), 91–95 (2016). Article ID: IJECET_07_06_013

    Google Scholar 

  2. Srividya, L., Sudha, P.N.: Physical layer secret symmetric key generation and management techniques for wireless systems-a study. JASC: J. Appl. Sci. Comput. VI(II) (2019). ISSN NO 1076-5131

    Google Scholar 

  3. Bloch, M., Barros, J., Rodrigues, M., McLaughlin, S.: Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515–2534 (2008)

    Article  MathSciNet  Google Scholar 

  4. Barros, J., Rodrigues, M.: Secrecy capacity of wireless channels. IEEE Trans

    Google Scholar 

  5. Nosrati, E., Wang, X., Khabbazibasmenj, A.: Secrecy capacity enhancement in two-hop DF relaying systems in the presence of eavesdropper. In: IEEE ICC - Communication and Information Systems Security Symposium, pp. 7365–7369 (2015)

    Google Scholar 

  6. Tunaru, I.: Physical layer secret key generation for decentralized wireless networks, signal and image processing, Université Rennes 1, Europe (2015)

    Google Scholar 

  7. Sudha, P.N.: Speech compression and error correction for mobile communication, JNTU, Anantapur, India (2012)

    Google Scholar 

  8. Wang, T., Liu, Y., Vasilakos, A.: Survey on channel reciprocity based key establishment techniques for wireless systems, 13 January 2015. Springer, New York (2015)

    Article  Google Scholar 

  9. Sahin, C., Katz, B., Dandekar, K.: Secure and robust symmetric key generation using physical layer techniques under various wireless environments, pp. 211–214. IEEE (2016)

    Google Scholar 

  10. Kostov, N.: Mobile radio channels modeling in MATLAB, n. kostov, mobile radio channels modeling in MATLAB

    Google Scholar 

  11. Harrison, W.: Physıcal-layer securıty: practıcal aspects of channel coding and cryptography, Georgia Institute of Technology (2012)

    Google Scholar 

  12. Padala, A., Kommana, K.: Performance of physical layer security with different service integrity parameters, Blekinge Institute of Technology SE-37179 Karlskrona, Sweden

    Google Scholar 

  13. Limmanee, A., Henkel, W.: Secure physical-layer key generation protocol and key encoding in wireless communications. In: IEEE Globecom Workshop on Heterogeneous, Multi-hop Wireless and Mobile Networks (2010)

    Google Scholar 

  14. Goel, S., Negi, R.: Obtaining secrecy through intentional uncertainty. In: Liu, R., Trappe, W., (eds.) Securing Wireless Communications at the Physical Layer, vol. 2, Springer (2010). https://doi.org/10.1007/978-1-4419-1385-2

    Google Scholar 

  15. Gungor, O., Tan, J., Koksal, C., El-Gamal, H., Shroff, N.: Secrecy Outage Capacity of Fading Channels, vol. 43210. The Ohio State University, Columbus

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Srividya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srividya, L., Sudha, P.N. (2020). Secrecy Capacity of Symmetric Keys Generated by Quantising Channel Metrics Over a Fading Channel. In: Smys, S., Bestak, R., Rocha, Á. (eds) Inventive Computation Technologies. ICICIT 2019. Lecture Notes in Networks and Systems, vol 98. Springer, Cham. https://doi.org/10.1007/978-3-030-33846-6_45

Download citation

Publish with us

Policies and ethics