• 제목/요약/키워드: Channel reciprocity

검색결과 20건 처리시간 0.022초

Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform

  • Zhan, Furui;Yao, Nianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2701-2722
    • /
    • 2017
  • Key generation is essential for protecting wireless networks. Based on wireless channel reciprocity, transceivers can generate shared secret keys by measuring their communicating channels. However, due to non-simultaneous measurements, asymmetric noises and other interferences, channel measurements collected by different transceivers are highly correlated but not identical and thus might have some discrepancies. Further, these discrepancies might lead to mismatches of bit sequences after quantization. The referred mismatches significantly affect the efficiency of key generation. In this paper, an efficient key generation scheme leveraging wireless channel reciprocity is proposed. To reduce the bit mismatch rate and enhance the efficiency of key generation, the involved transceivers separately apply discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) to pre-process their measurements. Then, the outputs of IDCT are quantified and encoded to establish the bit sequence. With the implementations of information reconciliation and privacy amplification, the shared secret key can be generated. Several experiments in real environments are conducted to evaluate the proposed scheme. During each experiment, the shared key is established from the received signal strength (RSS) of heterogeneous devices. The results of experiments demonstrate that the proposed scheme can efficiently generate shared secret keys between transceivers.

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권8호
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.

A Leakage-Based Solution for Interference Alignment in MIMO Interference Channel Networks

  • Shrestha, Robin;Bae, Insan;Kim, Jae Moung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권2호
    • /
    • pp.424-442
    • /
    • 2014
  • Most recent research on iterative solutions for interference alignment (IA) presents solutions assuming channel reciprocity based on the suppression of interference from undesired sources by using an appropriate decoding matrix also known as a receiver combining matrix for multiple input multiple output (MIMO) interference channel networks and reciprocal networks. In this paper, we present an alternative solution for IA by designing precoding and decoding matrices based on the concept of signal leakage (the measure of signal power that leaks to unintended users) on each transmit side. We propose an iterative algorithm for an IA solution based on maximization of the signal-to-leakage-and-noise ratio (SLNR) of the transmitted signal from each transmitter. In order to make an algorithm removing the requirement of channel reciprocity, we deploy maximization of the signal-to-interference-and-noise ratio (SINR) in the design of the decoding matrices. We show through simulation that minimizing the leakage in each transmission can help achieve enhanced performance in terms of aggregate sum capacity in the system.

TDD LTE 네트워크에서 궤환 채널의 Reciprocity를 이용한 효율적인 TDD LTE ICS 구조 설계 (An Efficient Scheme for TDD LTE ICS Exploiting the Reciprocity of the Feedback Channel in TDD LTE Networks)

  • 김현채;임성빈
    • 전자공학회논문지
    • /
    • 제53권2호
    • /
    • pp.17-23
    • /
    • 2016
  • TDD LTE 네트워크의 커버리지를 확장하는 방법의 하나인 ICS (Interference Cancellation System) 는 궤환 신호의 추정 및 제거 알고리즘 구조에 대한 연구가 필수적이다. FDD 방식의 LTE 네트워크에서의 Radio Access 방식과 달리 TDD 방식에서는 Radio Access를 위해서 하향링크와 상향링크는 동일 주파수 대역을 사용한다. 따라서 하향링크와 상향링크가 시간적으로 반복되며 상하향링크 각각의 궤환 신호의 추정이 주기적으로 정지 상태에 놓이게 되어 성능저하가 발생한다. 본 논문에서는 먼저 하향링크와 상향링크에서 reciprocity를 실험을 통하여 확인하고 하향링크와 상향링크가 동일 주파수 대역을 사용하는 점에 기초하여 채널 추정 및 제거 알고리즘을 하향링크와 상향링크에서 동일하게 사용하는 효과적인 구조를 제안한다.

Secret Key Generation Using Reciprocity in Ultra-wideband Outdoor Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권2호
    • /
    • pp.524-539
    • /
    • 2014
  • To investigate schemes of secret key generation from Ultra-wideband (UWB) channel, we study a statistical characterization of UWB outdoor channel for a campus playground scenario based on extensive measurements. Moreover, an efficient secret key generation mechanism exploiting multipath relative delay is developed, and verification of this algorithm is conducted in UWB Line-of-sight (LOS) outdoor channels. For the first time, we compare key-mismatch probability of UWB indoor and outdoor environments. Simulation results demonstrate that the number of multipath proportionally affects key generation rate and key-mismatch probability. In comparison to the conventional method using received signal strength (RSS) as a common random source, our mechanism achieves better performance in terms of common secret bit generation. Simultaneously, security analysis indicates that the proposed scheme can still guarantee security even in the sparse outdoor physical environment free of many reflectors.

순환 지연 다이버시티를 사용하는 OFDM 시스템을 위한 선형 프리코팅 기법 (A Linear Precoding Technique for OFDM Systems with Cyclic Delay Diversity)

  • 휘빙;김영범;장경희
    • 한국통신학회논문지
    • /
    • 제34권3A호
    • /
    • pp.197-204
    • /
    • 2009
  • 순환 지연 다이버시티(CDD, cyclic delay diversity) 기법은 주파수 다이버시티를 이용하여 OFDM 시스템의 성능을 향상시키는 기법이다. 또한, 선형 프리코딩 기법은 채널 상황 정보(CSI, channel state information)를 이용하여 통신 시스템의 성능을 크게 증가시킬 수 있는 기법이다. 본 논문은 기존의 CDD-OFDM 송신 다이버시티 기법보다 향상된 성능을 얻기 위하여 선형 프리코딩 기법의 적용을 제안한다. 제안된 기법은 채널 상황 정보 feedback이 필요한 FDD(frequency division duplex) 시스템 보다, feedback을 사용할 필요 없이 채널 가역성(reciprocity)의 성질을 이용할 수 있는 TDD(time division duplex) 시스템에서 더욱 효과적이다. 모의실험 결과를 통해 본 논문에서 제안된 기법이 기존의 프리코딩을 사용하지 않는 CDD-OFDM 시스템에 비하여 target BER $10^{-4}$에서 3km/h의 이동성(mobility)을 갖는 flat 페이딩 채널과 Pedestrian A(Ped A) 채널, 120km/h의 이동성을 갖는 flat 페이딩 채널과 Vehicular A(Veh A) 채널에서 각각 6.3dB. 6.2dB, 2.8dB, 3.8dB의 SNR 성능 이득을 얻는 것을 보인다.

A Linear Precoding Technique for OFDM Systems with Cyclic Delay Diversity

  • Hui, Bing;Chang, Kyung-Hi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제2권5호
    • /
    • pp.253-264
    • /
    • 2008
  • Cyclic delay diversity (CDD) is considered a simple approach to exploit the frequency diversity, to improve the system performance in orthogonal frequency division multiplexing (OFDM) systems. Also, the linear precoding technique can significantly improve the performance of communication systems by exploiting the channel state information (CSI). In order to achieve enhanced performance, we propose applying linear precoding to the conventional CDD-OFDM transmit diversity schemes over Rayleigh fading channels. The proposed scheme works effectively with the accurate CSI in time-division-duplex (TDD) OFDM systems with CDD, where the reciprocity is assumed instead of channel state feedback. For a BER of $10^{-4}$ and the mobility of 3 km/h, simulation results show that a gain of 6 dB is achieved by the proposed scheme over both flat fading and Pedestrian A (Ped A) channels, compared to the conventional CDD-OFDM system. On the other hand, for a mobility of 120 km/h, a gain of 2.7 dB and 3.8 dB is achieved in flat fading and Vehicular A (Veh A) channels, respectively.

순방향 및 역방향 신호를 이용한 핸드오버 기법 (Handover Scheme Using Downlink and Uplink Signals)

  • 조성현;권종형
    • 한국통신학회논문지
    • /
    • 제33권5A호
    • /
    • pp.542-548
    • /
    • 2008
  • 본 논문에서는 IEEE 802.16e 시스템에서 순방향 및 역방향 신호를 이용한 핸드오버 기법을 제안한다. 제안하는 기법은 TDD 시스템의 순방향 및 역방향 채널 상호 의존성에 기인하여 역방향 신호를 활용하여 핸드오버 절차를 구동 시킨다. 또한 핑퐁 현상 및 outage를 줄이기 위해 핸드오버 수행 여부 및 타깃 기지국 결정 시 순방향 및 역방향 hysteresis를 동시에 활용한다. 시뮬레이션 결과는 제안하는 방안이 기존IEEE 802.16e의 mobile assisted 핸드오버 기법에 비해 동일한 횟수의 핸드오버 수행 시 outage 확률을 약 10% 감소시킴을 보인다.

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems

  • Ning, Lina;Li, Bin;Wang, Xiang;Liu, Xiaoming;Zhao, Chenglin
    • ETRI Journal
    • /
    • 제43권5호
    • /
    • pp.941-949
    • /
    • 2021
  • In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink-downlink channel reciprocity in time-division-duplex multiple-input multiple-output systems. First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum. When the PSA occurs, the transmitter (That is Alice) can detect either one or two spatial spectrum peaks. Then, the legitimate user (That is Bob) and Eve are recognized in the downlink stage via the channel reciprocity property based on the difference between the spatial spectra if PSA occurs. This way, the presence of Eve and the direction of arrival of Eve and Bob can be identified at the transmitter end. Because noise is suppressed by a spatial spectrum, the detection performance is reliable even for low signal-noise ratios and a short training length. Consequently, Bob can use beamforming to transmit secure information during the data transmission stage. Theoretical analysis and numerical simulations are performed to evaluate the performance of the proposed scheme compared with conventional methods.

Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권10호
    • /
    • pp.3557-3571
    • /
    • 2014
  • We develop a secret key generation scheme using phase estimation in ultra-wideband (UWB) wireless fading channels. Based on the reciprocity theorem, two terminals extract the phase of the channel as a common random source to generate secret bits. Moreover, we study the secret key rate by a pair of nodes observing correlated sources and communicating to achieve secret key agreement over public communication channels. As our main results, we establish a more practical upper bound from Cramer-Rao bound (CRB) and compare it with a universally theoretical upper bound on the shared maximum key rate from mutual information of correlated random sources. Derivation and numerical examples are presented to demonstrate the bound. Simulation studies are also provided to validate feasibility and efficiency of the proposed scheme.