Dimensionality Reduction in Wireless Physical Layer Key Generation

被引:2
|
作者
Soni, Ankit [1 ]
Upadhyay, Raksha [1 ]
Kumar, Abhay [2 ]
机构
[1] IET DAVV, Dept Elect & Telecom, Indore, India
[2] Devi Ahilya Vishwavidyalaya, Sch Elect, Indore, India
关键词
dimensionality reduction; physical layer security; key generation; principal component analysis; bit disagreement;
D O I
10.1109/indicon47234.2019.9029059
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Achieving security in the wireless networks by extracting secure bits using physical layer key generation is one of the emerging ideas. However, for the networks with the resource constraint nodes, the security algorithm should be less computationally complex. This can be achieved by reducing the number of numerical computations or by reducing the dimensionality of input data. In this work, we propose to apply dimensionality reduction by the principal component analysis on the input vector of received signal strength for key generation. We select the principal components extracted from the input vector based on information content & cross-correlation, and instead of considering all the column of input vector we consider the column vectors corresponding to a few dominant principal components only, for secure key generation. The bit disagreement performance of the system is improved along with the reduction in several numerical calculations corresponding to the rejected input vectors at the cost of few extra computations. This reduces the computational power significantly as verified by simulation and experimental results with sufficient key randomness.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Topology Reduction at the Physical Layer for Wireless Sensor Networks
    Stoyanova, Tsenka
    Antonpoulos, Christos
    Dimova, Rosalina
    Koubias, Stavros
    Papadopoulos, George
    2016 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2016,
  • [32] Secret Key Generation Schemes for Physical Layer Security
    Kumar, Megha S.
    Ramanathan, R.
    Jayakumar, M.
    Yadav, Devendra Kumar
    DEFENCE SCIENCE JOURNAL, 2021, 71 (04) : 545 - 555
  • [33] Comparative Simulation for Physical Layer Key Generation Methods
    Saad, Amal
    Mohamed, Amr
    Elfouly, Tarek M.
    Khattab, Tamer
    Guizani, Mohsen
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 120 - 125
  • [34] Poster: Key Generation Scheme Based on Physical Layer
    Zhao, Hong
    Su, Chunhua
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 606 - 610
  • [35] Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN
    Xu, Weitao
    Jha, Sanjay
    Hu, Wen
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 231 - 236
  • [36] Physical Layer Secret Key Generation in Static Environments
    Aldaghri, Nasser
    Mahdavifar, Hessam
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2692 - 2705
  • [37] Key less physical layer security for wireless networks: A survey
    Kumar, Megha. S.
    Ramanathan, R.
    Jayakumar, M.
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 35
  • [38] Towards Wireless Secret key Agreement with LoRa Physical Layer
    Ruotsalainen, Henri
    Grebeniuk, Stepan
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [39] Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase
    Cheng, Longwang
    Zhou, Li
    Seet, Boon-Chong
    Li, Wei
    Ma, Dongtang
    Wei, Jibo
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [40] Practical Physical-Layer Group Secret-Key Generation in Three-User Wireless Networks
    Rao, Manish
    Harshan, J.
    2018 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS (SPCOM 2018), 2018, : 342 - 346