Secrecy Capacity of Symmetric Keys Generated by Quantising Channel Metrics Over a Fading Channel

  • L. SrividyaEmail author
  • P. N. Sudha
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)


Physical layer security has become the cornerstone of the wireless communication system. Key generation by channel estimation enables legitimate users to generate keys in a decentralised manner than sharing secret information in open wireless mediums. In this paper we propose secrecy evaluation of symmetric keys which are, generated by channel metrics estimated over the Rayleigh fading channel, encrypted and transmitted over a fading channel in the presence of an eavesdropper. The results are obtained in terms of secrecy capacity and outage probability for various key sizes, different position of eavesdroppers from the source. It is seen that as key size increases and distance of eavesdropper increases from the source the secrecy capacity increases. Also the performance of keys derrived from various channel metrics such as complex channel path gains, EVM rms and complex phase difference are discussed in this paper.


Physical layer security Key generation One time pad encryption Channel metrics Secrecy capacity Quantisation Outage probability 


  1. 1.
    Srividya, L., Sudha, P.N.: Literature survey on recent audıo encryptıon technıques. Int. J. Electron. Commun. Eng. Technol. (IJECET) 7(6), 91–95 (2016). Article ID: IJECET_07_06_013Google Scholar
  2. 2.
    Srividya, L., Sudha, P.N.: Physical layer secret symmetric key generation and management techniques for wireless systems-a study. JASC: J. Appl. Sci. Comput. VI(II) (2019). ISSN NO 1076-5131Google Scholar
  3. 3.
    Bloch, M., Barros, J., Rodrigues, M., McLaughlin, S.: Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515–2534 (2008)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Barros, J., Rodrigues, M.: Secrecy capacity of wireless channels. IEEE TransGoogle Scholar
  5. 5.
    Nosrati, E., Wang, X., Khabbazibasmenj, A.: Secrecy capacity enhancement in two-hop DF relaying systems in the presence of eavesdropper. In: IEEE ICC - Communication and Information Systems Security Symposium, pp. 7365–7369 (2015)Google Scholar
  6. 6.
    Tunaru, I.: Physical layer secret key generation for decentralized wireless networks, signal and image processing, Université Rennes 1, Europe (2015)Google Scholar
  7. 7.
    Sudha, P.N.: Speech compression and error correction for mobile communication, JNTU, Anantapur, India (2012)Google Scholar
  8. 8.
    Wang, T., Liu, Y., Vasilakos, A.: Survey on channel reciprocity based key establishment techniques for wireless systems, 13 January 2015. Springer, New York (2015)CrossRefGoogle Scholar
  9. 9.
    Sahin, C., Katz, B., Dandekar, K.: Secure and robust symmetric key generation using physical layer techniques under various wireless environments, pp. 211–214. IEEE (2016)Google Scholar
  10. 10.
    Kostov, N.: Mobile radio channels modeling in MATLAB, n. kostov, mobile radio channels modeling in MATLABGoogle Scholar
  11. 11.
    Harrison, W.: Physıcal-layer securıty: practıcal aspects of channel coding and cryptography, Georgia Institute of Technology (2012)Google Scholar
  12. 12.
    Padala, A., Kommana, K.: Performance of physical layer security with different service integrity parameters, Blekinge Institute of Technology SE-37179 Karlskrona, SwedenGoogle Scholar
  13. 13.
    Limmanee, A., Henkel, W.: Secure physical-layer key generation protocol and key encoding in wireless communications. In: IEEE Globecom Workshop on Heterogeneous, Multi-hop Wireless and Mobile Networks (2010)Google Scholar
  14. 14.
    Goel, S., Negi, R.: Obtaining secrecy through intentional uncertainty. In: Liu, R., Trappe, W., (eds.) Securing Wireless Communications at the Physical Layer, vol. 2, Springer (2010). Scholar
  15. 15.
    Gungor, O., Tan, J., Koksal, C., El-Gamal, H., Shroff, N.: Secrecy Outage Capacity of Fading Channels, vol. 43210. The Ohio State University, ColumbusGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of ECEDayananda Sagar College of EngineeringBangaloreIndia
  2. 2.Department of ECEK.S. Institute of TechnologyBangaloreIndia

Personalised recommendations