Paper
17 April 2019 Improving performance of secret key generation from wireless channel using filtering techniques
Author Affiliations +
Proceedings Volume 11071, Tenth International Conference on Signal Processing Systems; 1107112 (2019) https://doi.org/10.1117/12.2521870
Event: Tenth International Conference on Signal Processing Systems, 2018, Singapore, Singapore
Abstract
Secure communication in a wireless environment is very vital, and cryptographic schemes are usually used to ensure it. Secret keys that are unknown to the tappers are needed by cryptographic schemes to secure communication between two legitimate users. In recent years the secret key generation scheme that utilizes a wireless channel as a secret key generation source has become a very interesting and promising topic. The main problem of this scheme is the high wireless channel mismatch between two users due to nonsimultaneous measurements and noise from the device. In this paper, we proposed a secret key generation scheme that uses the Savitzky-Golay filter method to reduce the high mismatch wireless channel. The scheme that was built was also equipped with a multibit quantization method to increase the speed of generation of secret keys. The results of our tests show a decrease in wireless channel mismatch between two users and an increase in the speed of generation of secret keys.
© (2019) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Mike Yuliana, Wirawan, and Suwadi "Improving performance of secret key generation from wireless channel using filtering techniques ", Proc. SPIE 11071, Tenth International Conference on Signal Processing Systems, 1107112 (17 April 2019); https://doi.org/10.1117/12.2521870
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantization

Received signal strength

Digital filtering

Network security

Wireless communications

Electrical engineering

Information security

Back to Top