CSI Based Key Generation Technique

Authors

  • S.G. Kamble Dept. of ETE, Alamuri Ratnamala Institute of Engineering and Technology (ARIET), Thane, India
  • K.T. Jadhao Dept. of ETE, Alamuri Ratnamala Institute of Engineering and Technology (ARIET), Thane, India

Keywords:

M2M(Machine to Machine), CSI (Channel State information), OFDM(Orthogonal Frequency Division Multiplexing), RSS(Radio Subsystem)

Abstract

The role of communication in wireless technology is very important. This communication needs to be secured. System Administration has a number of aspects of which network security is considered as very essential. We live in a world where various types of information such as voice, multimedia or data analytics can be easily accessed anywhere and at any time. So we need to make sure that information is highly secured, authentic and accessible only to the authorized user. The user must receive this information with the highest level of security. We can secure communication by various techniques such as RSS. However it has its own demerits. To overcome its issues we can use key generation techniques based on CSI information in M2M communications. For that we will use OFDM channels. The process of generating a key using CSI information can be more efficient in terms of providing security as compared to RSS based technique, as they can generate a longer key. This technique generates the key randomly thereby preventing the attacker from decoding the key within the time span during which it would be vulnerable to the communication. The CSI information of the OFDM channel has a property by which it prevents an attacker from using the same algorithm and trying to sabotage the communication, by generating a different key.

 

References

Meng Zhang, Yuan Liu, Rui Zhang, “Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems”, IEEE Transactions on Wireless Communications, Vol.15, No.4, pp.3085-3096, 2016.

S. Tamilarasan, P. Kumar, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.53-59, 2017.

Rizwan Ahmed malik, Shahid Shabir, Ruchi Singla, “Review on OFDM: Concept scope and its application”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.48-50, 2016.

Chih-Yao Wu, Pang-Chang Lan, Ping-Cheng Yeh, Chia-Han Lee, Chen-Mou Cheng, “Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices”, IEEE Journal on Selected Areas in Communications, Vol.31, No.9, pp. 1687-1700, 2013.

B. Benarji, GS. Rao, SP. Setty, “BER Performance of OFDM System with various OFDM frames in AWGN Rayleigh and Rician Fading Channel”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.4, pp.6-11, 2015.

Y. Liu, S.C. Draper, A.M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness”, IEEE Transaction on Information Forensics and Security, Vol.7, No.5, pp.1484–1497, 2012.

X. Wang, M. Tao, J. Mo, Y. Xu, “Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks”, IEEE Transaction on Information Forensics and Security, Vol. 6, No. 3, pp. 693–702, 2011.

Y. Liu, S.C. Draper, A.M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness”, IEEE Transaction on Information Forensics and Security, Vol. 7, No. 5, pp. 1484–1497, 2012.

Downloads

Published

2017-05-30

How to Cite

[1]
S. Kamble and K. Jadhao, “CSI Based Key Generation Technique”, Int. J. Sci. Res. Net. Sec. Comm., vol. 5, no. 2, pp. 12–15, May 2017.

Issue

Section

Review Article

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.