Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment

Mike Yuliana, Wirawan Wirawan, Suwadi Suwadi

Abstract


The necessity for secured communication devices that has limited computing power has encouraged the development of key generation scheme. The generation of a symmetric key scheme that utilizes randomness of wireless channels offers a most promising solution as a result of the easy distribution of secret key mechanisms. In the last few years, various schemes have been proposed, but there are trade-offs between the performance parameters used. The expected parameters are the low Key Disagreement Rate (KDR), the high Key Generation Rate (KGR), and the fulfillment of standard of randomness. In this paper, we propose the use of a combination of pre-processing methods with multilevel lossy quantization to overcome the trade-off of performance parameters of the Secret Key Generation (SKG) scheme. Pre-process method used to improve reciprocity so as to reduce KDR, whereas multilevel quantization is used to improve the KGR. We use Kalman as the pre-processing method and Adaptive Quantization, Modified Multi-Bit (MMB), and 2-ary Quantization as the multilevel lossy quantization. Testing is conducted by comparing the performance between direct quantization with the addition of the pre-processing method in various multilevel lossy quantization schemes. The test results show that the use of Kalman as pre-processing methods and multilevel lossy quantization can overcome the trade-off performance parameters by reducing KDR and increasing KGR, with the best performance, was obtained when we use adaptive quantization. The resulting secret key has also fulfilled 6 random tests with p values greater than 0.01.

Keywords


KDR; KGR; secret key generation; Kalman; multilevel lossy quantization.

Full Text:

PDF

References


L. Chen, J. Ji, and Z. Zhang, Eds., Wireless Network Security : Theories and Applications. Springer, 2013.

W. Stallings, Cryptography and Network Security: Principles and Practice, 6th ed. Englewood Cliffs, NJ, USA: Prentice-Hall, 2013.

T. Belkhouja, X. Du, A. Mohamed, A.K. Al-Ali, and M. Guizani, “Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems, ” J. Sens. Actuator Netw., vol.7, 2018.

A.Rezai, P.Keshavarzi, and Z.Moravej, “Key management issue in SCADA networks: A review,” Engineering Science and Technology, an International Journal, vol.20, pp. 354-363, 2017.

R. Khalilian, A. Rezai, and F. Mesrinejad, “Secure Wireless Body Area Network (WBAN) Communication Method using New Random Key Management Scheme,” International Journal of Security and Its Applications, vol.10, no.11, pp. 13-22, 2016.

A.Rezai, P. Keshavarzi, and Z. Moravej, “Advance hybrid key management architecture for SCADA network security,” Security and Communication Networks, vol.9, no.17, pp. 4358-4368, 2016.

J. Zhang, T. Q. Duong, R. Woods, and A. Marshall, “Securing wireless communications of the internet of things from the physical layer, an overview,” Entropy, vol. 19, no. 8, pp. 1–16, 2017

S. T. Ali, V. Sivaraman, and D. Ostry, ‘‘Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices,’’ IEEE Trans. Mobile Comput., vol. 13, no. 12, pp. 2763–2776, Dec. 2014.

Y. Jiang, A. Hu, and J. Huang, “A lightweight physical-layer based security strategy for Internet of things, ” in Cluster Computing, vol.20, pp.1-13, March 2018.

S. Zhang, J. Peng, K. Huang, X.Xu, Z. Zhong, “Physical Layer Security in IoT:A spatial-temporal perspective,” in 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11-13 Oct. 2017.

G. Margelis, X.Fafoutis, G. Oikonomou, R. Piechocki, T. Tryfonas, and P. Thomas, “Physical Layer Secret-Key Generation with Discrete Cosine Transform for the Internet of Things,” in 2017 IEEE International Conference on Communications (ICC), Paris, France, 21-25 May 2017.

M.H.Chinaei, V.Sivaraman, D.Ostry, “An experimental study of secret key generation for passive Wi-Fi wearable devices,” 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Macau, China, 12-15 June 2017.

A.M.Adeshina, and R.Hashim, “Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES,” Interdisciplinary Sciences: Computational Life Sciences, vol.9, pp. 140-152, 2017.

R. Khalilian, A. Rezai, and E. Abedini, “An Efficient Method to Improve WBAN Security,” Advanced Science and Technology Letters, vol.64, pp. 43-46.

J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key Generation from Wireless Channels: A Review,” IEEE Access, vol. 4, pp. 614–626, 2016.

A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, ‘‘Principles of physical layer security in multiuser wireless networks: A survey,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550–1573, Aug. 2014.

B. U. V Prashanth and Y. Pandurangaiah, “Generation of Secret Key for Physical Layer to Evaluate Channel Characteristics in Wireless Communication,” Ercica, pp. 251–255, 2013.

A. Sadeghi, M. Zorzi, and F. Lahouti, “Analysis of key generation rate from wireless channel in in-band full-duplex communications,” 2016 IEEE Int. Conf. Commun. Work., pp. 104–109, 2016.

G.Li, A.Hu, J. Zhang, L.Peng, and C. Sun, “High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing,” IEEE Trans. On Communications, vol. 66, no. 7, pp. 3022-3034, July 2018.

S. Zhang, L.Jin, Y.Lou, and Z. Zhong, “Secret Key Generation Based on Two-Way Randomness for TDD-SISO System,” in China Communications, vol.15, issue (7) : 202-216, 2018.

R. Guillaume, F. Winzer, C. T. Zenger, C. Paar, and A. Czylwik, “Bringing PHY-based key generation into the field: An evaluation for practical scenarios,” 2015 IEEE 82nd Veh. Technol. Conf. VTC Fall 2015 - Proc., 2016.

C. T. Zenger, J. Zimmer, and C. Paar, ‘‘Security analysis of quantization schemes for channel-based key extraction,’’ in Proc. Workshop Wireless Commun. Secur. Phys. Layer, Coimbra, Portugal, Jul. 2015.

Y. Wei, K. Zeng, and P. Mohapatra, “Adaptive wireless channel probing for shared key generation based on PID controller,” IEEE Trans. Mob. Comput., vol. 12, no. 9, pp. 1842–1852, 2013.

R. Guillaume, A. Mueller, C. T. Zenger, C. Paar, and A. Czylwik, ‘‘Fair comparison and evaluation of quantization schemes for PHY-based key generation,’’ in Proc. 18th Int. OFDM Workshop (InOWo), Essen, Germany, Aug. 2014, pp. 1–5.

S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, ‘‘Radio- telepathy: Extracting a secret key from an unauthenticated wireless channel,’’ in Proc. 14th Annu. Int. Conf. Mobile Comput. Netw. (MobiCom), San Francisco, CA, USA, Sep. 2008, pp. 128–139.

C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, “Information-Theoretically Secret Key Generation for Fading Wireless Channels,” IEEE Transactions on Information Forensics and Security , vol. 5, no. 2, pp. 240–254, 2010.

Z. Kai, D. Wu, C. An, and P. Mohapatra, “Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks BT - INFOCOM, 2010 Proceedings IEEE,” pp. 1–9, 2010.

M. Yuliana, “Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment,” IJCNIS, vol. 9, no. 3, pp. 474–483, 2017.

S. N. Premnath, S. Jana, J. Croft, P. L. Gowda, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, “Secret Key Extraction fromWireless Signal Strength in Real Environments,” Mobile Computing, IEEE Transactions on, vol. 12, no. 5, pp. 917–930, May 2013.

A. Ambekar, M. Hassan, and H. D. Schotten, “Improving channel reciprocity for effective key management systems,” Conf. Proc. Int. Symp. Signals, Syst. Electron., pp. 1–4, 2012.

M. Yuliana, Wirawan, and Suwadi, “Performance evaluation of the key extraction schemes in wireless indoor environment,” in Proceedings - International Conference on Signals and Systems, ICSigSys 2017, 2017.

C. T. Zenger, J. Zimmer, M. Pietersz, J.-F. Posielek, and C. Paar, “Exploiting the Physical Environment for Securing the Internet of Things,” Proc. New Secur. Paradig. Work. ZZZ - NSPW ’15, pp. 44–58, 2015.

A. Ambekar, Exploiting Radio Channel Aware Physical Layer Concepts Zur Nutzung von Kanalzustandsinformation in Funk ¨ ubertragungskonzepten. 2015.

A. Rukhin et al., “A statistical test suite for random and pseudorandom number generators for cryptographic applications,” Natl. Inst. Stand. Technol., vol. 800, no. April, p. 131, 2010.

S. T. Ali and V. Sivaraman, “Secret key generation rate vs . reconciliation cost using wireless channel characteristics in body area networks,” 2010 IEEE/IFIP Int. Conf. on Embedded and Ubiquitous Computing Secret, Hong Kong, China, pp. 644-650, 2010.




DOI: http://dx.doi.org/10.18517/ijaseit.9.1.7583

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development