Full Paper View Go Back
CSI Based Key Generation Technique
S.G. Kamble1 , K.T. Jadhao2
1 Dept. of ETE, Alamuri Ratnamala Institute of Engineering and Technology, Thane, India.
2 Dept. of ETE, Alamuri Ratnamala Institute of Engineering and Technology, Thane, India.
3 Dept. of ETE, Alamuri Ratnamala Institute of Engineering and Technology (ARIET), Thane, India.
Correspondence should be addressed to: kamble.sandeep1990@gmail.com.
Section:Review Paper, Product Type: Journal
Vol.5 ,
Issue.2 , pp.12-15, May-2017
Online published on May 31, 2017
Copyright © S.G. Kamble, K.T. Jadhao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S.G. Kamble, K.T. Jadhao, “CSI Based Key Generation Technique,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.2, pp.12-15, 2017.
MLA Style Citation: S.G. Kamble, K.T. Jadhao "CSI Based Key Generation Technique." International Journal of Scientific Research in Network Security and Communication 5.2 (2017): 12-15.
APA Style Citation: S.G. Kamble, K.T. Jadhao, (2017). CSI Based Key Generation Technique. International Journal of Scientific Research in Network Security and Communication, 5(2), 12-15.
BibTex Style Citation:
@article{Kamble_2017,
author = {S.G. Kamble, K.T. Jadhao},
title = {CSI Based Key Generation Technique},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {5 2017},
volume = {5},
Issue = {2},
month = {5},
year = {2017},
issn = {2347-2693},
pages = {12-15},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=247},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=247
TI - CSI Based Key Generation Technique
T2 - International Journal of Scientific Research in Network Security and Communication
AU - S.G. Kamble, K.T. Jadhao
PY - 2017
DA - 2017/05/31
PB - IJCSE, Indore, INDIA
SP - 12-15
IS - 2
VL - 5
SN - 2347-2693
ER -
Abstract :
The role of communication in wireless technology is very important. This communication needs to be secured. System Administration has a number of aspects of which network security is considered as very essential. We live in a world where various types of information such as voice, multimedia or data analytics can be easily accessed anywhere and at any time. So we need to make sure that information is highly secured, authentic and accessible only to the authorized user. The user must receive this information with the highest level of security. We can secure communication by various techniques such as RSS. However it has its own demerits. To overcome its issues we can use key generation techniques based on CSI information in M2M communications. For that we will use OFDM channels. The process of generating a key using CSI information can be more efficient in terms of providing security as compared to RSS based technique, as they can generate a longer key. This technique generates the key randomly thereby preventing the attacker from decoding the key within the time span during which it would be vulnerable to the communication. The CSI information of the OFDM channel has a property by which it prevents an attacker from using the same algorithm and trying to sabotage the communication, by generating a different key.
Key-Words / Index Term :
M2M(Machine to Machine), CSI (Channel State information), OFDM(Orthogonal Frequency Division Multiplexing), RSS(Radio Subsystem)
References :
[1] Meng Zhang, Yuan Liu, Rui Zhang, “Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems”, IEEE Transactions on Wireless Communications, Vol.15, No.4, pp.3085-3096, 2016.
Google Scholar
[2] S. Tamilarasan, P. Kumar, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.53-59, 2017.
Google Scholar
[3] Rizwan Ahmed malik, Shahid Shabir, Ruchi Singla, “Review on OFDM: Concept scope and its application”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.48-50, 2016.
Google Scholar
[4] Chih-Yao Wu, Pang-Chang Lan, Ping-Cheng Yeh, Chia-Han Lee, Chen-Mou Cheng, “Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices”, IEEE Journal on Selected Areas in Communications, Vol.31, No.9, pp. 1687-1700, 2013.
Google Scholar
[5] B. Benarji, GS. Rao, SP. Setty, “BER Performance of OFDM System with various OFDM frames in AWGN Rayleigh and Rician Fading Channel”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.4, pp.6-11, 2015.
Google Scholar
[6] Y. Liu, S.C. Draper, A.M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness”, IEEE Transaction on Information Forensics and Security, Vol.7, No.5, pp.1484–1497, 2012.
Google Scholar
[7] X. Wang, M. Tao, J. Mo, Y. Xu, “Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks”, IEEE Transaction on Information Forensics and Security, Vol. 6, No. 3, pp. 693–702, 2011.
Google Scholar
[8] Y. Liu, S.C. Draper, A.M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness”, IEEE Transaction on Information Forensics and Security, Vol. 7, No. 5, pp. 1484–1497, 2012.
Google Scholar
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.