2019 IEEE International Conference on Communications Workshops (ICC Workshops) 2019
DOI: 10.1109/iccw.2019.8756656
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Key Generation from Imperfect Channel State Information: Performance Analysis and Improvements

Abstract: The basis of generating secret key from the common wireless channel at two communication parties is reciprocity. However, due to non-simultaneous measurements and unavoidable estimation error, bias always exists and key disagreement occurs. In this paper, performance analysis and improvements for key generation exploiting imperfect channel statement information (CSI) is studied. Firstly, the closed-form expression for key disagreement rate (KDR) is derived to evaluate the key mismatch caused by time delay and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…Remarkably, none of the aforementioned works have leveraged the potential capabilities of ML/DL techniques to come up with an intelligent security solution for WSKG. In fact, to the best of our knowledge, there are only a few papers addressing learning-aided schemes for wireless key agreement protocols [21]- [24]. For instance, [21] and [22] utilized a fully-connected (FC) neural network for a simple P2P communication in the presence of a simple passive eavesdropper.…”
Section: B Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Remarkably, none of the aforementioned works have leveraged the potential capabilities of ML/DL techniques to come up with an intelligent security solution for WSKG. In fact, to the best of our knowledge, there are only a few papers addressing learning-aided schemes for wireless key agreement protocols [21]- [24]. For instance, [21] and [22] utilized a fully-connected (FC) neural network for a simple P2P communication in the presence of a simple passive eavesdropper.…”
Section: B Related Workmentioning
confidence: 99%
“…In fact, to the best of our knowledge, there are only a few papers addressing learning-aided schemes for wireless key agreement protocols [21]- [24]. For instance, [21] and [22] utilized a fully-connected (FC) neural network for a simple P2P communication in the presence of a simple passive eavesdropper. Considering a similar topology, convolutional neural networks were proposed in [23].…”
Section: B Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Letafati et al [31] utilize echo-state networks to compensate for the observation mismatch between legitimate communicating parties caused by unbalanced hardware impairments. Guan et al [32] propose a feed-forward neural network-based prediction (NNBP) algorithm to enhance key consistency.…”
Section: Introductionmentioning
confidence: 99%