Key Generation for Secure Distributed Detection in IoT using Polar Quantization

Henri Hentila, Visa Koivunen, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

The problem of securing the communication in an IoT sensor network from malicious eavesdroppers is studied. One-time pad encryption is found to be a suitable encryption method for this type of setting, reducing the problem to the generation of secret keys to be used for the encryption. We propose a novel physical-layer security based key generation protocol where a Gaussian source derived from the wireless communicaton channel between key generating pairs is transformed into an erasure channel. The proposed method is shown to outperform other similar methods when allowing for a higher BER in the generated keys and constraining the rate of communication. We also analyze how the BER of the generated keys affects the underlying inference task of the sensor network.

Original languageEnglish (US)
Title of host publicationConference Record - 53rd Asilomar Conference on Circuits, Systems and Computers, ACSSC 2019
EditorsMichael B. Matthews
PublisherIEEE Computer Society
Pages1916-1920
Number of pages5
ISBN (Electronic)9781728143002
DOIs
StatePublished - Nov 2019
Externally publishedYes
Event53rd Asilomar Conference on Circuits, Systems and Computers, ACSSC 2019 - Pacific Grove, United States
Duration: Nov 3 2019Nov 6 2019

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
Volume2019-November
ISSN (Print)1058-6393

Conference

Conference53rd Asilomar Conference on Circuits, Systems and Computers, ACSSC 2019
Country/TerritoryUnited States
CityPacific Grove
Period11/3/1911/6/19

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Networks and Communications

Keywords

  • AWGN
  • distributed detection
  • physical-layer security
  • polar quantization
  • secret key generation

Fingerprint

Dive into the research topics of 'Key Generation for Secure Distributed Detection in IoT using Polar Quantization'. Together they form a unique fingerprint.

Cite this