Joint Localization-based Node Authentication and Secret Key Generation
Paper in proceeding, 2022

In this paper, we devise preprocessing schemes to disentangle channel state information (CSI) into predictable and unpredictable components to simultaneously provide two cornerstone security operations. The predictable components are used for node authentication and the unpredictable components for secret key generation (SKG). For the case of SKG, to prevent Eve from exploiting potential spatial, frequency or time correlations with the legitimate users, which would reduce the effective key space through a decrease in the brute force attack size, in this work, we emphasise the need for reducing the spatial correlation (SC) at different transmitter locations. We also study the trade-off between SC and reconciliation in the uplink and the downlink. Furthermore, we discuss the importance of a more robust criterion - independence - over decorrelation between the legitimate users and eavesdroppers. Finally, we propose a metric for quantifying uniqueness in the predictable components for node authentication, using the total variation distance (TVD).

Author

Muralikrishnan Srinivasan

Chalmers, Electrical Engineering, Communication, Antennas and Optical Networks

Sotiris Skaperas

University of Cergy-Pontoise

Mahdi Shakiba Herfeh

University of Cergy-Pontoise

Arsenia Chorti

University of Cergy-Pontoise

IEEE International Conference on Communications

15503607 (ISSN)

Vol. 2022-May 32-37
9781538683477 (ISBN)

2022 IEEE International Conference on Communications, ICC 2022
Seoul, South Korea,

Subject Categories

Signal Processing

Computer Science

Computer Systems

DOI

10.1109/ICC45855.2022.9838952

More information

Latest update

10/26/2023