Application cases of secret key generation in communication nodes and terminals

Christiane Kameni Ngassa, Taghrid Mazloum, François Delaveau, Sandrine Boumard, Nir Shapira, Renaud Molière, Alain Sibille, Adrian Kotelba, Jani Suomalainen

    Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

    Abstract

    The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.
    Original languageEnglish
    Title of host publicationTrusted Communications with Physical Layer Security for 5G and Beyond
    PublisherInstitution of Engineering and Technology IET
    Pages475-500
    ISBN (Print)9781785612367
    DOIs
    Publication statusPublished - 2017
    MoE publication typeD2 Article in professional manuals or guides or professional information systems or text book material

    Fingerprint

    Communication
    Long Term Evolution (LTE)
    Radio links
    Radio communication
    Processing
    Experiments

    Keywords

    • fading channels
    • cellular radio
    • OFDM modulation
    • telecommunication security
    • cognitive radio
    • space division multiplexing
    • 5G mobile communication
    • MIMO communication
    • relay networks

    Cite this

    Kameni Ngassa, C., Mazloum, T., Delaveau, F., Boumard, S., Shapira, N., Molière, R., ... Suomalainen, J. (2017). Application cases of secret key generation in communication nodes and terminals. In Trusted Communications with Physical Layer Security for 5G and Beyond (pp. 475-500). Institution of Engineering and Technology IET. https://doi.org/10.1049/PBTE076E_ch19
    Kameni Ngassa, Christiane ; Mazloum, Taghrid ; Delaveau, François ; Boumard, Sandrine ; Shapira, Nir ; Molière, Renaud ; Sibille, Alain ; Kotelba, Adrian ; Suomalainen, Jani. / Application cases of secret key generation in communication nodes and terminals. Trusted Communications with Physical Layer Security for 5G and Beyond. Institution of Engineering and Technology IET, 2017. pp. 475-500
    @inbook{ddd5cf602674405cba72e155a2bf2d6e,
    title = "Application cases of secret key generation in communication nodes and terminals",
    abstract = "The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.",
    keywords = "fading channels, cellular radio, OFDM modulation, telecommunication security, cognitive radio, space division multiplexing, 5G mobile communication, MIMO communication, relay networks",
    author = "{Kameni Ngassa}, Christiane and Taghrid Mazloum and Fran{\cc}ois Delaveau and Sandrine Boumard and Nir Shapira and Renaud Moli{\`e}re and Alain Sibille and Adrian Kotelba and Jani Suomalainen",
    note = "Project code: 78608",
    year = "2017",
    doi = "10.1049/PBTE076E_ch19",
    language = "English",
    isbn = "9781785612367",
    pages = "475--500",
    booktitle = "Trusted Communications with Physical Layer Security for 5G and Beyond",
    publisher = "Institution of Engineering and Technology IET",
    address = "United Kingdom",

    }

    Kameni Ngassa, C, Mazloum, T, Delaveau, F, Boumard, S, Shapira, N, Molière, R, Sibille, A, Kotelba, A & Suomalainen, J 2017, Application cases of secret key generation in communication nodes and terminals. in Trusted Communications with Physical Layer Security for 5G and Beyond. Institution of Engineering and Technology IET, pp. 475-500. https://doi.org/10.1049/PBTE076E_ch19

    Application cases of secret key generation in communication nodes and terminals. / Kameni Ngassa, Christiane; Mazloum, Taghrid; Delaveau, François; Boumard, Sandrine; Shapira, Nir; Molière, Renaud; Sibille, Alain; Kotelba, Adrian; Suomalainen, Jani.

    Trusted Communications with Physical Layer Security for 5G and Beyond. Institution of Engineering and Technology IET, 2017. p. 475-500.

    Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

    TY - CHAP

    T1 - Application cases of secret key generation in communication nodes and terminals

    AU - Kameni Ngassa, Christiane

    AU - Mazloum, Taghrid

    AU - Delaveau, François

    AU - Boumard, Sandrine

    AU - Shapira, Nir

    AU - Molière, Renaud

    AU - Sibille, Alain

    AU - Kotelba, Adrian

    AU - Suomalainen, Jani

    N1 - Project code: 78608

    PY - 2017

    Y1 - 2017

    N2 - The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.

    AB - The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.

    KW - fading channels

    KW - cellular radio

    KW - OFDM modulation

    KW - telecommunication security

    KW - cognitive radio

    KW - space division multiplexing

    KW - 5G mobile communication

    KW - MIMO communication

    KW - relay networks

    U2 - 10.1049/PBTE076E_ch19

    DO - 10.1049/PBTE076E_ch19

    M3 - Chapter or book article

    SN - 9781785612367

    SP - 475

    EP - 500

    BT - Trusted Communications with Physical Layer Security for 5G and Beyond

    PB - Institution of Engineering and Technology IET

    ER -

    Kameni Ngassa C, Mazloum T, Delaveau F, Boumard S, Shapira N, Molière R et al. Application cases of secret key generation in communication nodes and terminals. In Trusted Communications with Physical Layer Security for 5G and Beyond. Institution of Engineering and Technology IET. 2017. p. 475-500 https://doi.org/10.1049/PBTE076E_ch19