Application cases of secret key generation in communication nodes and terminals

Christiane Kameni Ngassa, Taghrid Mazloum, François Delaveau, Sandrine Boumard, Nir Shapira, Renaud Molière, Alain Sibille, Adrian Kotelba, Jani Suomalainen

    Research output: Chapter in Book/Report/Conference proceedingChapter or book articleScientificpeer-review


    The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.
    Original languageEnglish
    Title of host publicationTrusted Communications with Physical Layer Security for 5G and Beyond
    EditorsTrung Q. Dong, Xiangyun Zhou, H. Vincent Poor
    PublisherInstitution of Engineering and Technology IET
    ISBN (Electronic)978-1-78561-235-0
    ISBN (Print)978-1-78561-236-7
    Publication statusPublished - 1 Jan 2017
    MoE publication typeA3 Part of a book or another research book


    • fading channels
    • cellular radio
    • OFDM modulation
    • telecommunication security
    • cognitive radio
    • space division multiplexing
    • 5G mobile communication
    • MIMO communication
    • relay networks


    Dive into the research topics of 'Application cases of secret key generation in communication nodes and terminals'. Together they form a unique fingerprint.

    Cite this