• Title/Summary/Keyword: Channel reciprocity

Search Result 20, Processing Time 0.025 seconds

Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform

  • Zhan, Furui;Yao, Nianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2701-2722
    • /
    • 2017
  • Key generation is essential for protecting wireless networks. Based on wireless channel reciprocity, transceivers can generate shared secret keys by measuring their communicating channels. However, due to non-simultaneous measurements, asymmetric noises and other interferences, channel measurements collected by different transceivers are highly correlated but not identical and thus might have some discrepancies. Further, these discrepancies might lead to mismatches of bit sequences after quantization. The referred mismatches significantly affect the efficiency of key generation. In this paper, an efficient key generation scheme leveraging wireless channel reciprocity is proposed. To reduce the bit mismatch rate and enhance the efficiency of key generation, the involved transceivers separately apply discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) to pre-process their measurements. Then, the outputs of IDCT are quantified and encoded to establish the bit sequence. With the implementations of information reconciliation and privacy amplification, the shared secret key can be generated. Several experiments in real environments are conducted to evaluate the proposed scheme. During each experiment, the shared key is established from the received signal strength (RSS) of heterogeneous devices. The results of experiments demonstrate that the proposed scheme can efficiently generate shared secret keys between transceivers.

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.

A Leakage-Based Solution for Interference Alignment in MIMO Interference Channel Networks

  • Shrestha, Robin;Bae, Insan;Kim, Jae Moung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.424-442
    • /
    • 2014
  • Most recent research on iterative solutions for interference alignment (IA) presents solutions assuming channel reciprocity based on the suppression of interference from undesired sources by using an appropriate decoding matrix also known as a receiver combining matrix for multiple input multiple output (MIMO) interference channel networks and reciprocal networks. In this paper, we present an alternative solution for IA by designing precoding and decoding matrices based on the concept of signal leakage (the measure of signal power that leaks to unintended users) on each transmit side. We propose an iterative algorithm for an IA solution based on maximization of the signal-to-leakage-and-noise ratio (SLNR) of the transmitted signal from each transmitter. In order to make an algorithm removing the requirement of channel reciprocity, we deploy maximization of the signal-to-interference-and-noise ratio (SINR) in the design of the decoding matrices. We show through simulation that minimizing the leakage in each transmission can help achieve enhanced performance in terms of aggregate sum capacity in the system.

An Efficient Scheme for TDD LTE ICS Exploiting the Reciprocity of the Feedback Channel in TDD LTE Networks (TDD LTE 네트워크에서 궤환 채널의 Reciprocity를 이용한 효율적인 TDD LTE ICS 구조 설계)

  • Kim, Hyunchae;Im, Sungbin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.17-23
    • /
    • 2016
  • It is essential to develop an estimation and cancellation algorithm for feedback signals in designing the interference cancellation systems (ICS) as a solution to extending the coverage of the TDD LTE networks. Unlike the radio access of FDD LTE networks, TDD networks utilize the same frequency band in downlink and uplink for radio access. For this reason, downlink and uplink are repeated in time and thus the estimation of the feedback signals in uplink and downlink, respectively, is periodically paused to cause performance degradation. In this study, the reciprocity of downlink and uplink is examined through experiments and exploiting the same frequency band in uplink and downlink, an efficient channel estimation and elimination algorithm is proposed since the algorithm utilizes the same structure for both downlink and uplink.

Secret Key Generation Using Reciprocity in Ultra-wideband Outdoor Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.524-539
    • /
    • 2014
  • To investigate schemes of secret key generation from Ultra-wideband (UWB) channel, we study a statistical characterization of UWB outdoor channel for a campus playground scenario based on extensive measurements. Moreover, an efficient secret key generation mechanism exploiting multipath relative delay is developed, and verification of this algorithm is conducted in UWB Line-of-sight (LOS) outdoor channels. For the first time, we compare key-mismatch probability of UWB indoor and outdoor environments. Simulation results demonstrate that the number of multipath proportionally affects key generation rate and key-mismatch probability. In comparison to the conventional method using received signal strength (RSS) as a common random source, our mechanism achieves better performance in terms of common secret bit generation. Simultaneously, security analysis indicates that the proposed scheme can still guarantee security even in the sparse outdoor physical environment free of many reflectors.

A Linear Precoding Technique for OFDM Systems with Cyclic Delay Diversity (순환 지연 다이버시티를 사용하는 OFDM 시스템을 위한 선형 프리코팅 기법)

  • Hui, Bing;Kim, Young-Bum;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.197-204
    • /
    • 2009
  • Cyclic delay diversity (CDD) is considered a simple approach to exploit the frequency diversity, to improve the system performance in orthogonal frequency division multiplexing (OFDM) systems. Also, the linear preceding technique can significantly improve the performance of communication systems by exploiting the channel state in formation (CSI). In order to achieve enhanced performance, we propose applying linear preceding to the conventional CDD-OFDM transmit diversity schemes over Rayleigh fading channels. The proposed scheme works effectively with the accurate CSI in time-division-duplex (TDD) OFDM systems with CDD, where the reciprocity is ass umed instead of channel state feedback. For a BER of $10^{-4}$ and the mobility of 3 km/h, simulation results show that a gain of 6 dB is achieved by the proposed scheme over both flat fading and Pedestrian A (Ped A) channels, compared to the conventional CDD-OFDM system. On the other hand, for a mobility of 120 km/h, a gain of 2.7 dB and 3.8 dB is achieved in flat fading and Vehicular A (Veh A) channels, respectively.

A Linear Precoding Technique for OFDM Systems with Cyclic Delay Diversity

  • Hui, Bing;Chang, Kyung-Hi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.5
    • /
    • pp.253-264
    • /
    • 2008
  • Cyclic delay diversity (CDD) is considered a simple approach to exploit the frequency diversity, to improve the system performance in orthogonal frequency division multiplexing (OFDM) systems. Also, the linear precoding technique can significantly improve the performance of communication systems by exploiting the channel state information (CSI). In order to achieve enhanced performance, we propose applying linear precoding to the conventional CDD-OFDM transmit diversity schemes over Rayleigh fading channels. The proposed scheme works effectively with the accurate CSI in time-division-duplex (TDD) OFDM systems with CDD, where the reciprocity is assumed instead of channel state feedback. For a BER of $10^{-4}$ and the mobility of 3 km/h, simulation results show that a gain of 6 dB is achieved by the proposed scheme over both flat fading and Pedestrian A (Ped A) channels, compared to the conventional CDD-OFDM system. On the other hand, for a mobility of 120 km/h, a gain of 2.7 dB and 3.8 dB is achieved in flat fading and Vehicular A (Veh A) channels, respectively.

Handover Scheme Using Downlink and Uplink Signals (순방향 및 역방향 신호를 이용한 핸드오버 기법)

  • Cho, Sung-Hyun;Kwun, Jong-Hyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.542-548
    • /
    • 2008
  • This paper proposes a handover scheme using uplink and downlink signals in IEEE 802.16e systems. Exploiting the channel reciprocity in TDD systems, the proposed scheme triggers handover initiation process using uplink signal. In addition, it exploits the uplink and downlink hysteresis to determine the handover direction. Simulation results show that the proposed algorithm with joint hysteresis reduces the outage probability by about 10% compared with the mobile assisted handover in IEEE 802.16e.

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems

  • Ning, Lina;Li, Bin;Wang, Xiang;Liu, Xiaoming;Zhao, Chenglin
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.941-949
    • /
    • 2021
  • In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink-downlink channel reciprocity in time-division-duplex multiple-input multiple-output systems. First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum. When the PSA occurs, the transmitter (That is Alice) can detect either one or two spatial spectrum peaks. Then, the legitimate user (That is Bob) and Eve are recognized in the downlink stage via the channel reciprocity property based on the difference between the spatial spectra if PSA occurs. This way, the presence of Eve and the direction of arrival of Eve and Bob can be identified at the transmitter end. Because noise is suppressed by a spatial spectrum, the detection performance is reliable even for low signal-noise ratios and a short training length. Consequently, Bob can use beamforming to transmit secure information during the data transmission stage. Theoretical analysis and numerical simulations are performed to evaluate the performance of the proposed scheme compared with conventional methods.

Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3557-3571
    • /
    • 2014
  • We develop a secret key generation scheme using phase estimation in ultra-wideband (UWB) wireless fading channels. Based on the reciprocity theorem, two terminals extract the phase of the channel as a common random source to generate secret bits. Moreover, we study the secret key rate by a pair of nodes observing correlated sources and communicating to achieve secret key agreement over public communication channels. As our main results, we establish a more practical upper bound from Cramer-Rao bound (CRB) and compare it with a universally theoretical upper bound on the shared maximum key rate from mutual information of correlated random sources. Derivation and numerical examples are presented to demonstrate the bound. Simulation studies are also provided to validate feasibility and efficiency of the proposed scheme.