Abstract
This study introduces a decentralized approach to secure wireless communication using a cryptographic secret key generation algorithm among distributed nodes. The system model employs Gaussian prime numbers, ensuring the collaborative generation of a secret key. Pre-processing and post-processing functions enable to generate a secret key across the network. An error model evaluates aspects like thermal noise power and channel estimation errors, while simulations assess the success rate to factorize the norm of the secret key. It is observed that path loss-induced large scale fading emerges as a critical component impacting information and power loss. The robustness of the proposed model under fading channel conditions is evaluated with a success rate. Additionally, it is also observed that the tolerance value set in the factorization algorithms has a significant impact on the success rate. Furthermore, the success rate is compared in two scenarios, one with 2 users and another with 3 users, to provide a comprehensive evaluation of the system performance.
Original language | English |
---|---|
Title of host publication | 2024 6th International Conference on Communications, Signal Processing, and their Applications, ICCSPA 2024 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
ISBN (Electronic) | 9798350384819 |
DOIs | |
Publication status | Published - 2024 |
Event | 6th International Conference on Communications, Signal Processing, and their Applications, ICCSPA 2024 - Istanbul, Turkey Duration: 8 Jul 2024 → 11 Jul 2024 |
Publication series
Name | 2024 6th International Conference on Communications, Signal Processing, and their Applications, ICCSPA 2024 |
---|
Conference
Conference | 6th International Conference on Communications, Signal Processing, and their Applications, ICCSPA 2024 |
---|---|
Country/Territory | Turkey |
City | Istanbul |
Period | 8/07/24 → 11/07/24 |
Bibliographical note
Publisher Copyright:© 2024 IEEE.
Keywords
- analog function computation
- channel modeling
- cryptography
- error analysis
- key agreement
- key generation
- physical layer
- security
- wireless security