2016
DOI: 10.1109/access.2016.2604618
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Study on Key Generation for Physical Layer Security in Wireless Communications

Abstract: This paper presents a thorough experimental study on key generation principles, i.e., temporal variation, channel reciprocity, and spatial decorrelation, through a testbed constructed by using wireless open-access research platform. It is the first comprehensive study through: 1) carrying out a number of experiments in different multipath environments, including an anechoic chamber, a reverberation chamber, and an indoor office environment, which represents little, rich, and moderate multipath, respectively; 2… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
50
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 79 publications
(52 citation statements)
references
References 43 publications
2
50
0
Order By: Relevance
“…This requirement is relatively easy to meet. It has been reported in [9] that a key generation system with τ = 60 × 10 −6 s is designed. The mutual information change versus Doppler spread, f d , is shown in Fig.…”
Section: Simulation Results and Design Guidelinesmentioning
confidence: 99%
See 1 more Smart Citation
“…This requirement is relatively easy to meet. It has been reported in [9] that a key generation system with τ = 60 × 10 −6 s is designed. The mutual information change versus Doppler spread, f d , is shown in Fig.…”
Section: Simulation Results and Design Guidelinesmentioning
confidence: 99%
“…By taking into account the effects of channel qualities and channel estimation, a more practical implementation and setup was considered in [6]. Spatial decorrelation was experimentally studied in [7]- [9].…”
Section: Introductionmentioning
confidence: 99%
“…An elementary model for a wireless key generation was built, and various modifications in each block to enhance the performance of the overall system were proposed by Saad et al 11 Xu et al 12 proposed a low complexity group secret key generation approach by combining basic techniques like one time pad for various types of communication network. 13 Junqing et al 14 present guidelines related to practical design issue for secure key generation by considering parameters like sampling delay, pilot length, Doppler spread, etc. Further experimental study of the key generation approach in various real-time environments was done, and sufficient key agreement is achieved.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Further experimental study of the key generation approach in various real-time environments was done, and sufficient key agreement is achieved. 13 Junqing et al 14 present guidelines related to practical design issue for secure key generation by considering parameters like sampling delay, pilot length, Doppler spread, etc. The authors consider Nakagami-m fading channel with Gaussian noise and demonstrated a level crossing rate (LCR)-based key generation protocol by considering Doppler shift, fading, and number of paths with two level quantizers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…When the system works at 2.4 GHz, a half-wavelength is about 6 cm, which is quite short. These principles have been theoretically modeled and analyzed in [43], [44] and experimentally validated in [38], [39].…”
Section: Physical Layer Key Generationmentioning
confidence: 99%