Skip to Main content Skip to Navigation
Book sections

Application cases of secret key generation in communication nodes and terminals

Abstract : The main objective of this chapter is to study explicit key extraction techniques and algorithms for the security of radio communication. After some recalls on the main processing steps (Figure 19.1(a)) and on theoretical results relevant to the radio wiretap model (Figure 19.1(b)), we detail recent experimental results on randomness properties of real field radio channels. Furthermore, we detail a practical implantation of secret key generation (SKG) schemes, based on the Channel Quantization Alternate (CQA) algorithm helped with channel decorrelation techniques, into modern public networks such as WiFi and radio-cells of fourth generation (LTE, long-term evolution). Finally, through realistic simulations and real field experiments of radio links, we analyze the security performance of the implemented SKG schemes, and highlight their significant practical results and perspectives for future implantations into existing and next-generation radio standards.
Complete list of metadata
Contributor : TelecomParis HAL Connect in order to contact the contributor
Submitted on : Friday, September 13, 2019 - 5:12:23 PM
Last modification on : Monday, April 4, 2022 - 10:40:41 AM


  • HAL Id : hal-02287667, version 1


Alain Sibille, François Delaveau, Christiane L. Kameni Ngassa, Renaud Molière, Taghrid Mazloum, et al.. Application cases of secret key generation in communication nodes and terminals. Trusted Communications with Physical Layer Security for 5G and Beyond, IET, 2017. ⟨hal-02287667⟩



Record views