Secret Key Establishment Using Wireless Channels as Common Randomness in Time-variant MIMO Systems

Secret Key Establishment Using Wireless Channels as Common Randomness in Time-variant MIMO Systems PDF Author: Chan Chen
Publisher:
ISBN:
Category : Electronic dissertations
Languages : en
Pages : 137

Get Book Here

Book Description
Encryption of confidential data with a secret key has become a widespread technique for securing wireless transmissions. However, existing key distribution methods that either deliver the secret key with a key distribution center or exchange the secret key using public-key cryptosystems are unable to establish perfect secret keys necessary for symmetric encryption techniques. This research considers secret key establishment, under the broad research area of information theoretic security, using the reciprocal wireless channel as common randomness for the extraction of perfect secret keys in multiple-input multiple-output (MIMO)communication systems. The presentation discusses the fundamental characteristics of the time-variant MIMO wireless channel and establishes a realistic channel simulation model useful for assessing key establishment algorithms. Computational examples show the accuracy and applicability of the model. The discussion then turns to an investigation of the influence of the spatial and temporal correlation of the channel coefficients on the bound of the key size generated from the common channel, and it is found that a sampling approach exists that can generate a key using the minimum sampling time. A practical key generation protocol is then developed based on an enhancement of a published channel coefficient quantization method that incorporates flexible quantization levels, public transmission of the correlation eigenvector matrix and low-density parity-check (LDPC) coding to improve key agreement. This investigation leads to the development of improved channel quantization techniques that dynamically shift the quantization boundaries at one node based on the information provided by the other node. Analysis based on a closed-form bound for the key error rate (KER) and simulations based on the channel model and measurement data show that the enhanced algorithms are able to dramatically reduce key mismatch and asymptotically approach the KER bound. Finally, other secret key generation algorithms based on channel-encryption rather than quantization are discussed, leading to a new concept for secret key generation using the common wireless channel.

Secret Key Establishment Using Wireless Channels as Common Randomness in Time-variant MIMO Systems

Secret Key Establishment Using Wireless Channels as Common Randomness in Time-variant MIMO Systems PDF Author: Chan Chen
Publisher:
ISBN:
Category : Electronic dissertations
Languages : en
Pages : 137

Get Book Here

Book Description
Encryption of confidential data with a secret key has become a widespread technique for securing wireless transmissions. However, existing key distribution methods that either deliver the secret key with a key distribution center or exchange the secret key using public-key cryptosystems are unable to establish perfect secret keys necessary for symmetric encryption techniques. This research considers secret key establishment, under the broad research area of information theoretic security, using the reciprocal wireless channel as common randomness for the extraction of perfect secret keys in multiple-input multiple-output (MIMO)communication systems. The presentation discusses the fundamental characteristics of the time-variant MIMO wireless channel and establishes a realistic channel simulation model useful for assessing key establishment algorithms. Computational examples show the accuracy and applicability of the model. The discussion then turns to an investigation of the influence of the spatial and temporal correlation of the channel coefficients on the bound of the key size generated from the common channel, and it is found that a sampling approach exists that can generate a key using the minimum sampling time. A practical key generation protocol is then developed based on an enhancement of a published channel coefficient quantization method that incorporates flexible quantization levels, public transmission of the correlation eigenvector matrix and low-density parity-check (LDPC) coding to improve key agreement. This investigation leads to the development of improved channel quantization techniques that dynamically shift the quantization boundaries at one node based on the information provided by the other node. Analysis based on a closed-form bound for the key error rate (KER) and simulations based on the channel model and measurement data show that the enhanced algorithms are able to dramatically reduce key mismatch and asymptotically approach the KER bound. Finally, other secret key generation algorithms based on channel-encryption rather than quantization are discussed, leading to a new concept for secret key generation using the common wireless channel.

Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems

Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems PDF Author: Britton T. Quist
Publisher:
ISBN:
Category : Electronic dissertations
Languages : en
Pages : 110

Get Book Here

Book Description
Establishing secret keys from the commonly-observed randomness of reciprocal wireless propagation channels has recently received considerable attention. In this work we propose improved strategies for channel estimation between MIMO or beamforming systems for secret key generation. The amount of mutual information that can be extracted from the channel matrix estimates is determined by the quality of channel matrix estimates. By allocating increased energy to channel estimation for higher gain beamforming combinations at the expense of low-gain combinations, key establishment performance can be increased. Formalizing the notion of preferential energy allocation to the most efficient excitations is the central theme of this dissertation. For probing with beamforming systems, we formulate a theoretically optimal probing strategy that upper bounds the number of key bits that can be generated from reciprocal channel observations. Specifically, we demonstrate that the eigenvectors of the channel spatial covariance matrix should be used as beamformer weights during channel estimation and we optimize the energy allocated to channel estimation for each beamformer weight under a total energy constraint. The optimal probing strategy is not directly implementable in practice, and therefore we propose two different modifications to the optimal algorithm based on a Kronecker approximation to the spatial covariance matrix. Though these approximations are suboptimal, they each perform well relative to the upper bound. To explore how effective an array is at extracting all of the information available in the propagation environment connecting two nodes, we apply the optimal beamformer probing strategy to a vector current basis function expansion on the array volume. We prove that the resulting key rate is a key rate spatial bound that upper bounds the key rate achievable by any set of antenna arrays probing the channel with the same total energy constraint. For MIMO systems we assume the channel is separable with a Kronecker model, and then for that model we propose an improved probing strategy that iteratively optimizes the energy allocation for each node using concave maximization. The performance of this iterative approach is better than that achieved using the traditional probing strategy in many realistic probing scenarios.

Shared Secret Key Establishment Using Wireless Channel Measurements

Shared Secret Key Establishment Using Wireless Channel Measurements PDF Author: Jessica Erin Dudley Croft
Publisher:
ISBN:
Category : Wireless communication systems
Languages : en
Pages : 85

Get Book Here

Book Description


Wireless Internet

Wireless Internet PDF Author: Shahid Mumtaz
Publisher: Springer
ISBN: 331918802X
Category : Computers
Languages : en
Pages : 360

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Wireless Internet, WICON 2014, held in Lisbon, Portugal, in November 2014. The 45 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as 5G mobile communications, Internet of Things (IoT), super Wi-Fi and V2V/V21.

MIMO-OFDM Wireless Communications with MATLAB

MIMO-OFDM Wireless Communications with MATLAB PDF Author: Yong Soo Cho
Publisher: John Wiley & Sons
ISBN: 0470825626
Category : Technology & Engineering
Languages : en
Pages : 458

Get Book Here

Book Description
MIMO-OFDM is a key technology for next-generation cellular communications (3GPP-LTE, Mobile WiMAX, IMT-Advanced) as well as wireless LAN (IEEE 802.11a, IEEE 802.11n), wireless PAN (MB-OFDM), and broadcasting (DAB, DVB, DMB). In MIMO-OFDM Wireless Communications with MATLAB®, the authors provide a comprehensive introduction to the theory and practice of wireless channel modeling, OFDM, and MIMO, using MATLAB® programs to simulate the various techniques on MIMO-OFDM systems. One of the only books in the area dedicated to explaining simulation aspects Covers implementation to help cement the key concepts Uses materials that have been classroom-tested in numerous universities Provides the analytic solutions and practical examples with downloadable MATLAB® codes Simulation examples based on actual industry and research projects Presentation slides with key equations and figures for instructor use MIMO-OFDM Wireless Communications with MATLAB® is a key text for graduate students in wireless communications. Professionals and technicians in wireless communication fields, graduate students in signal processing, as well as senior undergraduates majoring in wireless communications will find this book a practical introduction to the MIMO-OFDM techniques. Instructor materials and MATLAB® code examples available for download at www.wiley.com/go/chomimo

Physical-Layer Security

Physical-Layer Security PDF Author: Matthieu Bloch
Publisher: Cambridge University Press
ISBN: 1139496298
Category : Technology & Engineering
Languages : en
Pages : 347

Get Book Here

Book Description
This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.

RF Imperfections in High-rate Wireless Systems

RF Imperfections in High-rate Wireless Systems PDF Author: Tim Schenk
Publisher: Springer Science & Business Media
ISBN: 1402069030
Category : Technology & Engineering
Languages : en
Pages : 323

Get Book Here

Book Description
This is one of the first books on the emerging research topic of digital compensation of RF imperfections. The book presents a new multidisciplinary vision on the design of wireless communication systems. In this approach the imperfections of the RF front-ends are accepted and digital signal processing algorithms are designed to suppress their impact on system performance. The book focuses on multiple-antenna orthogonal frequency division multiplexing (MIMO OFDM).

Wireless Communications

Wireless Communications PDF Author: Andreas F. Molisch
Publisher: John Wiley & Sons
ISBN: 1118355687
Category : Technology & Engineering
Languages : en
Pages : 883

Get Book Here

Book Description
"Professor Andreas F. Molisch, renowned researcher and educator, has put together the comprehensive book, Wireless Communications. The second edition, which includes a wealth of new material on important topics, ensures the role of the text as the key resource for every student, researcher, and practitioner in the field." —Professor Moe Win, MIT, USA Wireless communications has grown rapidly over the past decade from a niche market into one of the most important, fast moving industries. Fully updated to incorporate the latest research and developments, Wireless Communications, Second Edition provides an authoritative overview of the principles and applications of mobile communication technology. The author provides an in-depth analysis of current treatment of the area, addressing both the traditional elements, such as Rayleigh fading, BER in flat fading channels, and equalisation, and more recently emerging topics such as multi-user detection in CDMA systems, MIMO systems, and cognitive radio. The dominant wireless standards; including cellular, cordless and wireless LANs; are discussed. Topics featured include: wireless propagation channels, transceivers and signal processing, multiple access and advanced transceiver schemes, and standardised wireless systems. Combines mathematical descriptions with intuitive explanations of the physical facts, enabling readers to acquire a deep understanding of the subject. Includes new chapters on cognitive radio, cooperative communications and relaying, video coding, 3GPP Long Term Evolution, and WiMax; plus significant new sections on multi-user MIMO, 802.11n, and information theory. Companion website featuring: supplementary material on 'DECT', solutions manual and presentation slides for instructors, appendices, list of abbreviations and other useful resources.

Communication System Security

Communication System Security PDF Author: Lidong Chen
Publisher: CRC Press
ISBN: 1439840369
Category : Computers
Languages : en
Pages : 752

Get Book Here

Book Description
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions. Taking an evolutionary approach to security in today’s telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios. Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks. With much of the material used by the authors in their courses and drawn from their industry experiences, this book is appropriate for a wide audience, from engineering, computer science, and mathematics students to engineers, designers, and computer scientists. Illustrating security principles with existing protocols, the text helps readers understand the principles and practice of security analysis.

Physical Layer Security in Random Cellular Networks

Physical Layer Security in Random Cellular Networks PDF Author: Hui-Ming Wang
Publisher: Springer
ISBN: 9811015759
Category : Computers
Languages : en
Pages : 127

Get Book Here

Book Description
This book investigates key security issues in connection with the physical layer for random wireless cellular networks. It first introduces readers to the fundamentals of information theoretic security in the physical layer. By examining recently introduced security techniques for wireless point-to-point communications, the book proposes new solutions to physical layer security based on stochastic geometric frameworks for random cellular networks. It subsequently elaborates on physical-layer security in multi-tier heterogeneous networks. With the new modeled settings, the authors also verify the security performance with the impact of the full-duplex transceivers. The specific model design presented here offers a valuable point of reference for readers in related areas. In addition, the book highlights promising topics and proposes potential future research directions.