Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa Channel

  • Xuanxuan Wang
  • Lihuan Jiang
  • Lars Thiele
  • Yongming WangEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9543)


The existing scheme of secret key extraction based on the channel properties can be implemented in the three steps: quantization, information reconciliation and privacy amplification. Despite the tremendous researches of quantization and information reconciliation techniques, there is little consideration about the risk of information reconstruction by the unauthorized node due to the high correlation of subsequent quantization bits, which is unavoidably leaked on the public channel between quantization and information reconciliation. In this paper, we propose an improved scheme of secret key extraction with quantization randomness using Hadamard matrix on QuaDRiGa channel. Simulation results show that with this kind of quantization randomness, the correlation between the subsequent quantization bits can be significantly decreased, which can reduce the possibility of information reconstruction by the unauthorized node, and the improved scheme can increase the randomness of the final secret key bits as compared with the existing ones.


Quantization randomness Hadamard matrix Correlation Secret key extraction 


  1. 1.
    Sayeed, A., Perrig, A.: Secure wireless communications: secret keys through multipath. In: Speech and Signal Processing, Acoustics, pp. 3013–3016 (2008)Google Scholar
  2. 2.
    Guillaume, R., Mueller, A., Zenger, C.T., Paar, C., Czylwik, A.: Fair comparison and evaluation of quantization schemes for PHY-based key generation. In: Proceedings of 18th International OFDM Workshop (InOWo 2014), pp. 1–5 (2014)Google Scholar
  3. 3.
    Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, pp. 321–332. ACM (2009)Google Scholar
  4. 4.
    Zenger, C.T., Chur, M.-J., Posielek, J.-F., Paar, C., G. Wunder: A novel key generating architecture for wireless low-resource devices. In: International Workshop on Secure Internet of Things (SIoT), pp. 26–34. IEEE (2014)Google Scholar
  5. 5.
    Bloch, M., Barros, J.: Physical-Layer Security: from Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)Google Scholar
  6. 6.
    Tope, M., McEachen, J.C.: Unconditionally secure communications over fading channels. In: Military Communications Conference, MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force, vol. 1, pp. 54–58. IEEE (2001)Google Scholar
  7. 7.
    Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio- telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 128–139. ACM (2008)Google Scholar
  8. 8.
    Bloch, M., Thangaraj, A., McLaughlin, S.W., Merolla, J.-M.: LDPC-based secret key agreement over the Gaussian wiretap channel. In: IEEE International Symposium on Information Theory, pp. 1179–1183. IEEE (2006)Google Scholar
  9. 9.
    Etesami, J., Henkel, W., Wakeel, A.: LDPC code construction for wireless physical-layer key reconciliation. In: First IEEE International Conference on Communications in China (ICCC 2012). Beijing (2012)Google Scholar
  10. 10.
  11. 11.
    Ella, V.S.: Randomization using quasigroups, hadamard and number theoretic transforms (2012). arXiv preprint arXiv:1202.0223
  12. 12.
    Reddy, R.S.: Encryption of binary and non-binary data using chained hadamard transforms (2010). arXiv preprint arXiv:1012.4452
  13. 13.

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Xuanxuan Wang
    • 1
  • Lihuan Jiang
    • 2
  • Lars Thiele
    • 2
  • Yongming Wang
    • 1
    Email author
  1. 1.Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  2. 2.Fraunhofer Institute for Telecommunications, Heinrich Hertz InstituteBerlinGermany

Personalised recommendations