Application cases of secret key generation in communication nodes and terminals

Christiane Kameni Ngassa, Taghrid Mazloum, François Delaveau, Sandrine Boumard, Nir Shapira, Renaud Molière, Alain Sibille, Adrian Kotelba, Jani Suomalainen

    Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

    Abstract

    The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.
    Original languageEnglish
    Title of host publicationTrusted Communications with Physical Layer Security for 5G and Beyond
    PublisherInstitution of Engineering and Technology IET
    Pages475-500
    ISBN (Print)9781785612367
    DOIs
    Publication statusPublished - 2017
    MoE publication typeD2 Article in professional manuals or guides or professional information systems or text book material

    Keywords

    • fading channels
    • cellular radio
    • OFDM modulation
    • telecommunication security
    • cognitive radio
    • space division multiplexing
    • 5G mobile communication
    • MIMO communication
    • relay networks

    Fingerprint Dive into the research topics of 'Application cases of secret key generation in communication nodes and terminals'. Together they form a unique fingerprint.

  • Cite this

    Kameni Ngassa, C., Mazloum, T., Delaveau, F., Boumard, S., Shapira, N., Molière, R., Sibille, A., Kotelba, A., & Suomalainen, J. (2017). Application cases of secret key generation in communication nodes and terminals. In Trusted Communications with Physical Layer Security for 5G and Beyond (pp. 475-500). Institution of Engineering and Technology IET. https://doi.org/10.1049/PBTE076E_ch19