CSI Based Key Generation Technique
Keywords:
M2M(Machine to Machine), CSI (Channel State information), OFDM(Orthogonal Frequency Division Multiplexing), RSS(Radio Subsystem)Abstract
The role of communication in wireless technology is very important. This communication needs to be secured. System Administration has a number of aspects of which network security is considered as very essential. We live in a world where various types of information such as voice, multimedia or data analytics can be easily accessed anywhere and at any time. So we need to make sure that information is highly secured, authentic and accessible only to the authorized user. The user must receive this information with the highest level of security. We can secure communication by various techniques such as RSS. However it has its own demerits. To overcome its issues we can use key generation techniques based on CSI information in M2M communications. For that we will use OFDM channels. The process of generating a key using CSI information can be more efficient in terms of providing security as compared to RSS based technique, as they can generate a longer key. This technique generates the key randomly thereby preventing the attacker from decoding the key within the time span during which it would be vulnerable to the communication. The CSI information of the OFDM channel has a property by which it prevents an attacker from using the same algorithm and trying to sabotage the communication, by generating a different key.
References
Meng Zhang, Yuan Liu, Rui Zhang, “Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems”, IEEE Transactions on Wireless Communications, Vol.15, No.4, pp.3085-3096, 2016.
S. Tamilarasan, P. Kumar, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.53-59, 2017.
Rizwan Ahmed malik, Shahid Shabir, Ruchi Singla, “Review on OFDM: Concept scope and its application”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.8, pp.48-50, 2016.
Chih-Yao Wu, Pang-Chang Lan, Ping-Cheng Yeh, Chia-Han Lee, Chen-Mou Cheng, “Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices”, IEEE Journal on Selected Areas in Communications, Vol.31, No.9, pp. 1687-1700, 2013.
B. Benarji, GS. Rao, SP. Setty, “BER Performance of OFDM System with various OFDM frames in AWGN Rayleigh and Rician Fading Channel”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.4, pp.6-11, 2015.
Y. Liu, S.C. Draper, A.M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness”, IEEE Transaction on Information Forensics and Security, Vol.7, No.5, pp.1484–1497, 2012.
X. Wang, M. Tao, J. Mo, Y. Xu, “Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks”, IEEE Transaction on Information Forensics and Security, Vol. 6, No. 3, pp. 693–702, 2011.
Y. Liu, S.C. Draper, A.M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness”, IEEE Transaction on Information Forensics and Security, Vol. 7, No. 5, pp. 1484–1497, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.