Full Paper View Go Back

A Survey on Quantization Schemes for Secure Key Generation

U.R. Bhatt1 , R. Sharma2 , A. Soni3 , R. Upadhyay4

  1. Dept. of Electronics and Telecommunication, IET- Devi Ahilya University, Indore, India.
  2. Dept. of Electronics and Telecommunication, IET- Devi Ahilya University, Indore, India.
  3. Dept. of Electronics and Telecommunication, IET- Devi Ahilya University, Indore, India.
  4. Dept. of Electronics and Telecommunication, IET- Devi Ahilya University, Indore, India.

Correspondence should be addressed to: umarathore@rediffmaill.com.


Section:Research Paper, Product Type: Isroset-Journal
Vol.5 , Issue.3 , pp.42-46, Jun-2017


Online published on Jun 30, 2017


Copyright © U.R. Bhatt, R. Sharma, A. Soni, R. Upadhyay . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: U.R. Bhatt, R. Sharma, A. Soni, R. Upadhyay, “A Survey on Quantization Schemes for Secure Key Generation,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.42-46, 2017.

MLA Style Citation: U.R. Bhatt, R. Sharma, A. Soni, R. Upadhyay "A Survey on Quantization Schemes for Secure Key Generation." International Journal of Scientific Research in Computer Science and Engineering 5.3 (2017): 42-46.

APA Style Citation: U.R. Bhatt, R. Sharma, A. Soni, R. Upadhyay, (2017). A Survey on Quantization Schemes for Secure Key Generation. International Journal of Scientific Research in Computer Science and Engineering, 5(3), 42-46.

BibTex Style Citation:
@article{Bhatt_2017,
author = {U.R. Bhatt, R. Sharma, A. Soni, R. Upadhyay},
title = {A Survey on Quantization Schemes for Secure Key Generation},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {3},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {42-46},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=388},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=388
TI - A Survey on Quantization Schemes for Secure Key Generation
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - U.R. Bhatt, R. Sharma, A. Soni, R. Upadhyay
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 42-46
IS - 3
VL - 5
SN - 2347-2693
ER -

349 Views    352 Downloads    209 Downloads
  
  

Abstract :
Secure key generation is one of the promising approach to establish secured link between two legitimate nodes for wireless communication. We established a system, which generate the secret key at the both end of the legitimate node. Secure key generation system contain four major block namely channel estimation, quantization, information reconciliation and privacy amplification, in which quantization is one of the important module. In secured key generation, output of the quantizer will affects the bit mismatch rate significantly. The present paper analyses different quantization schemes to make synchronization between two nodes. By applying key generation technique, we analyze effect of quantization bit on the key disagreement rate.

Key-Words / Index Term :
Secure key generation; Quantization, Key Disagreement Rate (KDR)

References :
[1] A. Badawya, T Elfouly, T Khattab, A Mohamedb, M Guizani, “Unleashing the secure potential of the wireless physical layer: Secret key generation methods”, Physical Communication, Vol. 19, Issue.6, pp. 1-10, 2016.
[2] J. Zhang, T.Q. Duongl, A. marshall, and R. woods, “Key Generation From Wireless Channels: A Review”, IEEE Access, Vol. 4, Issue.1, pp.614-624, 2016 .
[3] C. T. Zenger, J. Zimmer, C. Paar, “Security Analysis of Quantization Schemes for Channel-based Key Extraction”, in proc. Workshop wireless commun. Secur. Phys. Layer, portugal, pp.1-7, 2015
[4] C.T. Zenger, M.J. Chur, J.F. Posielek, C. Parr, “A Novel Key Generating Architecture for Wireless Low-Resource Devices”, International Workshop on Secure Internet of Things, Poland, pp. 26-34, 2014.
[5] S. Mathur, W. Trappe, N.B. Mandayam, C Ye, A. Reznik, “Radio-telepathy: extracting a secret key from an unauthenticated wireless channel”, 14th Annual International Conference on Mobile Computing and Networking, USA, pp 128–139, 2008.
[6] S. Jana, S. N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, “On the effectiveness of secret key extraction from wireless signal strength in real environments”, In the presseding of 15th Annual International Conference on Mobile Computing and Networking, China, pp. 321-332, 2009.
[7] N. Patwari, J. Croft, S. Jana, S.K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements”, IEEE Trans. Mob. Comput., Vol 9, Issue1, pp.17-30, 2010.
[8] A. Ambekar, M. Hassan, H.D. Schotten, “Improving channel reciprocity for effective key management systems”, 2012 International Symposium on In Signals Systems and Electronics (ISSSE), UK, pp.1-4, Oct 2012.
[9] R. Guillaume, A. Mueller, C.T. Zenger, Christof Paar Andreas Czylwik “Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation”, 18th International OFDM Workshop,Germany, pp.1-8, 2014.
[10] X. Wang, L. Thiele, T. Haustein, Y. Wang, “Secret key Generation Using Entropy-Constrained-Like Quantization Scheme ”, 23rd International Conference on Telecommunications (ICT),, China, pp.34-40, 2016
[11] A. Badawy, T. Khattab, T. El-Fouly, A. Mohamed, D. Trinchero, “Secret key Generation based on AOA estimation for low SNR condition”, IEEE 81st vehicular technology conference, VTC sprint, pp. 1-7, 2015
[12] H. Li, L. Chen, “RSSI-Aware Energy Saving For Large File Downloading on Smartphones”, IEEE Emebedded System Letters, Vol. 7, Issue 2, pp.63-66, 2015

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation