Fuzzy Secret Key Generation based on Phase Extraction and Constellation Rotation

被引:0
|
作者
Shen, Ning [1 ]
Du, Qinghe
Lu, Lei
Zhao, Shijiao
机构
[1] Xi An Jiao Tong Univ, Sch Informat & Commun Engn, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical Layer Security (PLS); Secret Key Generation (SKG); Constellation Rotation;
D O I
10.1109/VTC2023-Spring57618.2023.10200596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical layer security (PLS) of wireless communications is becoming increasingly significant with the advent of 6G. The reconciliation of channel-based secret key generation (SKG) methods is necessary to avoid inconsistencies after key generation, resulting in increased communication overhead, leakage of key information, and reduced security performance. This paper proposes a fuzzy secret key generation (FSKG) method that does not require the legitimate user to perform a consistency check after fuzzy extraction of the phase, which is used directly to encrypt the constellation rotation of the key. The proposed scheme allows users to code-decode the key bits to reduce the transmission error probability and improve the key consistency, and the simulation results prove that the proposed FSKG scheme outperforms traditional SKG schemes like CQA and CQG. The simulation results also indicate that the best secure key rate can be achieved by applying PSK modulation.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Cooperative Secret Key Generation for Platoon-based Vehicular Communications
    Li, Kai
    Lu, Lingyun
    Ni, Wei
    Tovar, Eduardo
    Guizani, Mohsen
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [42] A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
    Xia Enjun
    Hu Binjie
    Shen Qiaoqiao
    China Communications, 2024, 21 (06) : 163 - 175
  • [43] Efficient DCT-based secret key generation for the Internet of Things
    Margelis, George
    Fafoutis, Xenofon
    Oikonomou, George
    Piechocki, Robert
    Tryfonas, Theo
    Thomas, Paul
    AD HOC NETWORKS, 2019, 92
  • [44] Secret Key Generation Based on AoA Estimation for Low SNR Conditions
    Badawy, Ahmed
    Khattab, Tamer
    El-Fouly, Tarek
    Mohamed, Amr
    Trinchero, Daniele
    Chiasserini, Carla-Fabiana
    2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,
  • [45] Verifiable Secret Sharing and Distributed Key Generation Based on Hyperplane Geometry
    Yang, Xiaoyun
    Xia, Zhe
    Xiao, Min
    2015 2ND INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING AND INTERNET OF THINGS (DCIT), 2015, : 142 - 145
  • [46] Deep Learning based Channel Reciprocity Technique for Secret Key Generation
    Wulandari, Dewi Cahyo
    Yuliana, Mike
    Sudarsono, Amang
    2024 INTERNATIONAL ELECTRONICS SYMPOSIUM, IES 2024, 2024, : 234 - 240
  • [47] Fuzzy vault for face based cryptographic key generation
    Wang, Yongjin
    Plataniotis, K. N.
    2007 BIOMETRICS SYMPOSIUM, 2007, : 120 - 125
  • [48] Extraction of TLS Master Secret Key in Windows
    Lee, Hyoseok
    Choi, Hyoung-kee
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 667 - 671
  • [49] Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart Wearables
    Javali, Chitra
    Revadigar, Girish
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 338 - 357
  • [50] Unshared Secret Key Cryptography: Finite Constellation Inputs and Ideal Secrecy Outage
    Liu, Shuiyin
    Hong, Yi
    Viterbo, Emanuele
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 4175 - 4180