Application cases of secret key generation in communication nodes and terminals

Christiane Kameni Ngassa, Taghrid Mazloum, François Delaveau, Sandrine Boumard, Nir Shapira, Renaud Molière, Alain Sibille, Adrian Kotelba, Jani Suomalainen

Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

Abstract

The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.
Original languageEnglish
Title of host publicationTrusted Communications with Physical Layer Security for 5G and Beyond
PublisherInstitution of Engineering and Technology IET
Pages475-500
ISBN (Print)9781785612367
DOIs
Publication statusPublished - 2017
MoE publication typeD2 Article in professional manuals or guides or professional information systems or text book material

Fingerprint

Communication
Long Term Evolution (LTE)
Radio links
Radio communication
Processing
Experiments

Keywords

  • fading channels
  • cellular radio
  • OFDM modulation
  • telecommunication security
  • cognitive radio
  • space division multiplexing
  • 5G mobile communication
  • MIMO communication
  • relay networks

Cite this

Kameni Ngassa, C., Mazloum, T., Delaveau, F., Boumard, S., Shapira, N., Molière, R., ... Suomalainen, J. (2017). Application cases of secret key generation in communication nodes and terminals. In Trusted Communications with Physical Layer Security for 5G and Beyond (pp. 475-500). Institution of Engineering and Technology IET. https://doi.org/10.1049/PBTE076E_ch19
Kameni Ngassa, Christiane ; Mazloum, Taghrid ; Delaveau, François ; Boumard, Sandrine ; Shapira, Nir ; Molière, Renaud ; Sibille, Alain ; Kotelba, Adrian ; Suomalainen, Jani. / Application cases of secret key generation in communication nodes and terminals. Trusted Communications with Physical Layer Security for 5G and Beyond. Institution of Engineering and Technology IET, 2017. pp. 475-500
@inbook{ddd5cf602674405cba72e155a2bf2d6e,
title = "Application cases of secret key generation in communication nodes and terminals",
abstract = "The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.",
keywords = "fading channels, cellular radio, OFDM modulation, telecommunication security, cognitive radio, space division multiplexing, 5G mobile communication, MIMO communication, relay networks",
author = "{Kameni Ngassa}, Christiane and Taghrid Mazloum and Fran{\cc}ois Delaveau and Sandrine Boumard and Nir Shapira and Renaud Moli{\`e}re and Alain Sibille and Adrian Kotelba and Jani Suomalainen",
note = "Project code: 78608",
year = "2017",
doi = "10.1049/PBTE076E_ch19",
language = "English",
isbn = "9781785612367",
pages = "475--500",
booktitle = "Trusted Communications with Physical Layer Security for 5G and Beyond",
publisher = "Institution of Engineering and Technology IET",
address = "United Kingdom",

}

Kameni Ngassa, C, Mazloum, T, Delaveau, F, Boumard, S, Shapira, N, Molière, R, Sibille, A, Kotelba, A & Suomalainen, J 2017, Application cases of secret key generation in communication nodes and terminals. in Trusted Communications with Physical Layer Security for 5G and Beyond. Institution of Engineering and Technology IET, pp. 475-500. https://doi.org/10.1049/PBTE076E_ch19

Application cases of secret key generation in communication nodes and terminals. / Kameni Ngassa, Christiane; Mazloum, Taghrid; Delaveau, François; Boumard, Sandrine; Shapira, Nir; Molière, Renaud; Sibille, Alain; Kotelba, Adrian; Suomalainen, Jani.

Trusted Communications with Physical Layer Security for 5G and Beyond. Institution of Engineering and Technology IET, 2017. p. 475-500.

Research output: Chapter in Book/Report/Conference proceedingChapter or book articleProfessional

TY - CHAP

T1 - Application cases of secret key generation in communication nodes and terminals

AU - Kameni Ngassa, Christiane

AU - Mazloum, Taghrid

AU - Delaveau, François

AU - Boumard, Sandrine

AU - Shapira, Nir

AU - Molière, Renaud

AU - Sibille, Alain

AU - Kotelba, Adrian

AU - Suomalainen, Jani

N1 - Project code: 78608

PY - 2017

Y1 - 2017

N2 - The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.

AB - The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectivesfor future implantations into existing and next-generation radio standards.

KW - fading channels

KW - cellular radio

KW - OFDM modulation

KW - telecommunication security

KW - cognitive radio

KW - space division multiplexing

KW - 5G mobile communication

KW - MIMO communication

KW - relay networks

U2 - 10.1049/PBTE076E_ch19

DO - 10.1049/PBTE076E_ch19

M3 - Chapter or book article

SN - 9781785612367

SP - 475

EP - 500

BT - Trusted Communications with Physical Layer Security for 5G and Beyond

PB - Institution of Engineering and Technology IET

ER -

Kameni Ngassa C, Mazloum T, Delaveau F, Boumard S, Shapira N, Molière R et al. Application cases of secret key generation in communication nodes and terminals. In Trusted Communications with Physical Layer Security for 5G and Beyond. Institution of Engineering and Technology IET. 2017. p. 475-500 https://doi.org/10.1049/PBTE076E_ch19