Next Article in Journal
Dual-Mode FPGA-Based Triple-TDC With Real-Time Calibration and a Triple Modular Redundancy Scheme
Next Article in Special Issue
Cyclostationary Impulsive Noise Mitigation in the Presence of Cyclic Frequency Offset for Narrowband Powerline Communication Systems
Previous Article in Journal
Development of Real-Time Implementation of a Wind Power Generation System with Modular Multilevel Converters for Hardware in the Loop Simulation Using MATLAB/Simulink
Previous Article in Special Issue
Cooperative Non-Orthogonal Multiple Access over Log-Normal Power Line Communication Channels
Open AccessArticle

Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel

Department of Networked and Embedded Systems, University of Klagenfurt, 9020 Klagenfurt am Wörthersee, Austria
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(4), 605; https://doi.org/10.3390/electronics9040605
Received: 17 February 2020 / Revised: 22 March 2020 / Accepted: 28 March 2020 / Published: 2 April 2020
(This article belongs to the Special Issue Advances of Power Line Communication (PLC))
Leakage of information in power line communication (PLC) networks is a threat to privacy and security. A way to enhance security is to encode the transmitted information with the use of a secret key. If the communication channel exhibits common characteristics at both ends and these are unknown to a potential eavesdropper, then it is possible to locally generate a common secret key at the two communication ends without the need for sharing it through the broadcast channel. This is known as physical layer key generation. To this aim, known techniques have been developed exploiting the transfer function of symmetric channels. However, the PLC channel is in general not symmetric, but just reciprocal. Therefore, in this paper, we first analyze the characteristics of the channel to verify whether physical layer key generation can be implemented. Then, we propose two novel methods that exploit the reciprocity of the PLC channel to generate common information by the two intended users. This information is processed through different quantization techniques to generate secret keys locally. To assess the security of the generated keys, we analyze the spatial correlation of PLC channels. This allows verifying whether the eavesdropper’s channels are weakly correlated with the intended users’ channel. Consequently, it is found that the information leaked to a possible eavesdropper has very low correlation to the locally generated key. The analysis and proposed methods are validated on a measurement dataset. View Full-Text
Keywords: physical layer security; key generation; power line communications; reciprocal systems physical layer security; key generation; power line communications; reciprocal systems
Show Figures

Figure 1

MDPI and ACS Style

Passerini, F.; Tonello, A.M. Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel. Electronics 2020, 9, 605. https://doi.org/10.3390/electronics9040605

AMA Style

Passerini F, Tonello AM. Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel. Electronics. 2020; 9(4):605. https://doi.org/10.3390/electronics9040605

Chicago/Turabian Style

Passerini, Federico; Tonello, Andrea M. 2020. "Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel" Electronics 9, no. 4: 605. https://doi.org/10.3390/electronics9040605

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop