Key Generation for Secure Distributed Detection in IoT using Polar Quantization

Henri Hentilä, Visa Koivunen, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

2 Citations (Scopus)

Abstract

The problem of securing the communication in an IoT sensor network from malicious eavesdroppers is studied. One-time pad encryption is found to be a suitable encryption method for this type of setting, reducing the problem to the generation of secret keys to be used for the encryption. We propose a novel physical-layer security based key generation protocol where a Gaussian source derived from the wireless communicaton channel between key generating pairs is transformed into an erasure channel. The proposed method is shown to outperform other similar methods when allowing for a higher BER in the generated keys and constraining the rate of communication. We also analyze how the BER of the generated keys affects the underlying inference task of the sensor network.

Original languageEnglish
Title of host publicationAsilomar Conference on Signals, Systems, and Computers proceedings
EditorsMichael B. Matthews
PublisherIEEE
Pages1916-1920
Number of pages5
ISBN (Electronic)9781728143002
DOIs
Publication statusPublished - Nov 2019
MoE publication typeA4 Conference publication
EventAsilomar Conference on Signals, Systems & Computers - Pacific Grove, United States
Duration: 3 Nov 20196 Nov 2019

Publication series

NameAsilomar Conference on Signals, Systems, and Computers proceedings
ISSN (Electronic)1058-6393

Conference

ConferenceAsilomar Conference on Signals, Systems & Computers
Abbreviated titleACSSC
Country/TerritoryUnited States
CityPacific Grove
Period03/11/201906/11/2019

Keywords

  • AWGN
  • distributed detection
  • physical-layer security
  • polar quantization
  • secret key generation

Fingerprint

Dive into the research topics of 'Key Generation for Secure Distributed Detection in IoT using Polar Quantization'. Together they form a unique fingerprint.

Cite this