Cargando…
Non-Reconciled Physical-Layer Keys-Assisted Secure Communication Scheme Based on Channel Correlation
Physical-layer key generation technology requires information reconciliation to correct channel estimation errors between two legitimate users. However, sending the reconciliation signals over the public channel increases the communication overhead and the risk of information leakage. Aiming at the...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9407056/ https://www.ncbi.nlm.nih.gov/pubmed/36010831 http://dx.doi.org/10.3390/e24081167 |
Sumario: | Physical-layer key generation technology requires information reconciliation to correct channel estimation errors between two legitimate users. However, sending the reconciliation signals over the public channel increases the communication overhead and the risk of information leakage. Aiming at the problem, integrated secure communication schemes using non-reconciled keys have attracted extensive attention. These schemes exploit channel coding to correct both inconsistent keys and transmission error bits. Meanwhile, more redundant code bits must be added to correct errors, which results in a lower secure transmission rate. To address the problem, we analyze the merit of channel correlation between non-reconciled key generation and secure transmission. Inspired by this, we propose a non-reconciled physical-layer keys-assisted secure communication scheme based on channel correlation. First of all, the signal frame is designed to make use of channel correlation between non-reconciled key generation and secure transmission. Based on the channel correlation, non-reconciled keys are then generated from the wireless channel to encrypt transmitted data. Moreover, an adaptive coding algorithm based on the equivalent channel is presented to encode the data bits before encryption, to guarantee reliable transmission. Finally, theoretical analysis and simulations demonstrate the significant performance of the proposed scheme in terms of low bit error ratio and high secure transmission rate. |
---|