Optimal Singular Value Decomposition Based Pre-coding for Secret Key Extraction from Correlated Orthogonal Frequency Division Multiplexing Sub-channels

Document Type : Original Article


Department of Electrical and Computer Engineering, Babol Noshirvani University of Technology, Babol, Iran


Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is addressed in this paper. As an assumption, a realistic model for dependency among sub-channels is considered. Benchmarked by simulation, the result shows that the key exchange rate may decline by up to 72% due to the correlation of sub-channels. A new approach for efficient key extraction is used in this study. To do this, a Singular Value Decomposition based (SVD-based) pre-coding is utilized to alleviate the sub-channels correlation and the channel noise. The low computational complexity of our proposed approach makes it a promising candidate for developing secure and high-speed networks. Results obtained through simulation indicate that applying pre-coding on the measured correlated data resulted in a minimum gain of 9 dB. In addition, the result also depicts the advantage of SVD versus other pre-coding techniques, namely PCA, DCT, and WT.


1. Melki, R., Noura, H.N., Mansour, M.M. and Chehab, A., “A survey on ofdm physical layer security”, Physical Communication, Vol. 32, No., (2019), 1-30. https://doi.org/10.1016/j.phycom.2018.10.008
2. Chen, Y., Wen, H., Wu, J., Song, H., Xu, A., Jiang, Y., Zhang, T. and Wang, Z., “Clustering based physical-layer authentication in edge computing systems with asymmetric resources”, Sensors, Vol. 19, No. 8, (2019), 1926. https://doi.org/10.3390/s19081926
3. Jiang, Y., Zou, Y., Guo, H., Zhu, J. and Gu, J., “Power allocation for intelligent interference exploitation aided physical-layer security in ofdm-based heterogeneous cellular networks”, IEEE Transactions on Vehicular Technology, Vol. 69, No. 3, (2020), 3021-3033. doi: 10.1109/TVT.2020.2966637
4. Zhan, F. and Yao, N., “Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform”, KSII Transactions on Internet and Information Systems, Vol. 11, No. 5, (2017), 2701-2722. https://doi.org/10.3837/tiis.2017.05.022
5. Zhang, J., Duong, T.Q., Marshall, A. and Woods, R., “Key generation from wireless channels: A review”, IEEE Access, Vol. 4, (2016), 614-626. doi: 10.1109/ACCESS.2016.2521718
6. Cheng, L., Zhou, L., Seet, B.-C., Li, W., Ma, D. and Wei, J., “Efficient physical-layer secret key generation and authentication schemes based on wireless channel-phase”, Mobile Information Systems, Vol. 2017, (2017), 1-13. https://doi.org/10.1155/2017/7393526
7. Genkin, D., Pachmanov, L., Pipman, I., Tromer, E. and Yarom, Y., “Ecdsa key extraction from mobile devices via nonintrusive physical side channels”, In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. (2016), 1626-1638. https://doi.org/10.1145/2976749.2978353
8. Liu, H., Yang, J., Wang, Y. and Chen, Y., “Collaborative secret key extraction leveraging received signal strength in mobile wireless networks”, In Proceedings IEEE INFOCOM, IEEE, (2012), 927-935. doi: 10.1109/INFCOM.2012.6195843
9. Li, G., Hu, A., Zhang, J., Peng, L., Sun, C. and Cao, D., “High-agreement uncorrelated secret key generation based on principal component analysis preprocessing”, IEEE Transactions on Communications, Vol. 66, No. 7, (2018), 3022-3034. doi: 10.1109/TCOMM.2018.2814607
10. Bloch, M., Thangaraj, A., McLaughlin, S.W. and Merolla, J.-M., “Ldpc-based secret key agreement over the gaussian wiretap channel”, In IEEE International Symposium on Information Theory, IEEE, (2006), 1179-1183. doi: 10.1109/ISIT.2006.261991
11. Peng, L., Li, G. and Hu, A., “Channel reciprocity improvement of secret key generation with loop-back transmissions”, In IEEE 17th International Conference on Communication Technology (ICCT), IEEE, (2017), 193-198. doi: 10.1109/ICCT.2017.8359629
12. Shehadeh, Y.E.H. and Hogrefe, D., “An optimal guard-intervals based mechanism for key generation from multipath wireless channels”, In 4th IFIP International Conference on New Technologies, Mobility and Security, IEEE, (2011), 1-5. doi: 10.1109/NTMS.2011.5720584
13. Liu, H., Wang, Y., Yang, J. and Chen, Y., “Fast and practical secret key extraction by exploiting channel response”, In Proceedings IEEE INFOCOM, IEEE, (2013), 3048-3056. doi: 10.1109/INFCOM.2013.6567117
14. Zhang, J., Marshall, A., Woods, R. and Duong, T.Q., “Efficient key generation by exploiting randomness from channel responses of individual ofdm subcarriers”, IEEE Transactions on Communications, Vol. 64, No. 6, (2016), 2578-2588. doi: 10.1109/TCOMM.2016.2552165
15. Chen, C. and Jensen, M.A., “Secret key establishment using temporally and spatially correlated wireless channel coefficients”, IEEE Transactions on Mobile Computing, Vol. 10, No. 2, (2010), 205-215. doi: 10.1109/TMC.2010.114
16. Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T. and Thomas, P., “Physical layer secret-key generation with discreet cosine transform for the internet of things”, In IEEE International Conference on Communications (ICC), IEEE, (2017), 1-6. doi: 10.1109/ICC.2017.7997419
17. Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T. and Thomas, P., “Efficient dct-based secret key generation for the internet of things”, Ad Hoc Networks, Vol. 92, (2019), 101744. https://doi.org/10.1016/j.adhoc.2018.08.014
18. Wu, Y., Sun, Y., Zhan, L. and Ji, Y., “Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network”, International Journal of Distributed Sensor Networks, Vol. 9, No. 6, (2013), 1-16. https://doi.org/10.1155/2013/912873
19. Zhan, F. and Yao, N., “On the using of discrete wavelet transform for physical layer key generation”, Ad Hoc Networks, Vol. 64, (2017), 22-31. https://doi.org/10.1016/j.adhoc.2017.06.003
20. Cheng, L., Li, W., Zhou, L., Zhu, C., Wei, J. and Guo, Y., “Increasing secret key capacity of ofdm systems: A geometric program approach”, Concurrency and Computation: Practice