2022 5th International Conference on Advances in Science and Technology (ICAST) 2022
DOI: 10.1109/icast55766.2022.10039641
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Quantization Schemes for Physical Layer Key generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The main goal of quantization method is to generate preliminary key which will have high entropy for security, reduced Bit Mismatch Rate (BMR) between two users using same quantization method so that both the users will have an identical secret key, and higher KGR. Researchers have used lossy and lossless quantizers to convert the probed channel samples into bits [11]. Lossless quantizers are discussed in [12], 19], [21], [23], 24], [25] and lossy quantizers are discussed in [20], [22].…”
Section: Quantizationmentioning
confidence: 99%
See 3 more Smart Citations
“…The main goal of quantization method is to generate preliminary key which will have high entropy for security, reduced Bit Mismatch Rate (BMR) between two users using same quantization method so that both the users will have an identical secret key, and higher KGR. Researchers have used lossy and lossless quantizers to convert the probed channel samples into bits [11]. Lossless quantizers are discussed in [12], 19], [21], [23], 24], [25] and lossy quantizers are discussed in [20], [22].…”
Section: Quantizationmentioning
confidence: 99%
“…In the proposed research work, for generation of the secret key, the end users obtain the RSS and CIR samples from the channel. Quantization is performed on these samples using Vector quantization with Affinity propagation clustering (VQAPC) [44]. The research work presented in this paper proposes a novel hybrid, protocol and code related information reconciliation scheme (HPC-IR) by combining the advantages of both cascade protocol and LDPC code.…”
Section: Information Reconciliationmentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, the preprocessing block is vital in generating a secure key as it reduces noise content and other vulnerabilities in the data set. The data in PLKG is quantized using different quantizers, such as lossy, 14 lossless, 15 uniform, and non‐uniform 16,17 . This process helps reduce the dataset's size, improving power efficiency and reducing computational complexity for PLKG systems or power‐constrained networks like the Internet of Things (IoT).…”
Section: Introductionmentioning
confidence: 99%