Skema Peningkatan Reciprocity Kanal dengan Menggunakan Metode Hierarchical Clustering
Abstract
Secret key generation scheme that utilizesthe randomness of wireless channels is a very promising alternative to establish a secure communication path. Some wireless devices are used to obtain the channel parameters. But the problem that occurs is imprecise measurement results, causinga secret key difference between the two users. To overcome this problem, pre-processing method is used before the data is quantized, to increase the similarity (reciprocity) channel parameter measurement results. In this paper, the effect of the use of one pre-process method, which was hierarchical clustering, on the performance of secret key generation scheme in an indoorenvironment with two variations of scenario was investigated.The results show that the use of the pre-processingmethod can improve the similarity parameter of the channel measurement results as indicated by the increasing of correlation values up to 20%. In addition, the resulting bit mismatch also decreases with the value of key disagreement rate (KDR) maximum of 20%.
References
W. Stallings, Cryptography and Network Security: Principles and Practice, 6th ed. Upper Saddle River, NJ, USA: Prentice Hall, 2013.
A. Karima, L.B. Handoko, dan A. Saputro, “Pemfaktoran Bilangan Prima pada Algoritma ElGamal untuk Keamanan Dokumen PDF,” Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), Vol. 6, No. 3, hal. 252-258, Agustus 2017.
A. Mukherjee, S. Fakoorian, J. Huang, dan A. Swindlehurst, “Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey,” IEEE Commun. Surveys Tuts., Vol. 16, No. 3, hal. 1550–1573, 2014.
S. N. Premnath, S. Jana, J. Croft, P. L. Gowda, M. Clark, S. K. Kasera, N. Patwari, dan S. V. Krishnamurthy, “Secret Key Extraction from Wireless Signal Strength in Real Environments,” IEEE Trans. Mobile Comput., Vol. 12, No. 5, hal. 917–930, 2013.
S. Ali, V. Sivaraman, dan D. Ostry, “Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices,” IEEE Trans. Mobile Comput., Vol. 13, No. 12, hal. 2763–2776, 2014.
B. Zan, M. Gruteser, dan F. Hu, “Key Agreement Algorithms for Vehicular Communication Networks Based on Reciprocity and Diversity Theorems,” IEEE Trans. Veh. Technol., Vol. 62, No. 8, hal. 4020–4027, 2013.
M. Yuliana, Wirawan, dan Suwadi “Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment,” IJCNIS, Vol. 9, No. 3, hal. 474–483, 2017.
J. Zhang, R. Woods, T.Q.Duong, A. Marshall, dan Y. Ding, “Experimental Study on Channel Reciprocity in Wireless Key Generation”, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2016, hal. 1-5.
L. Shi, J. Yuan, S. Yu, dan M. Li, “ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks,” Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC’13, 2013, hal. 155–166.
M. Edman, A. Kiayias, Q. Tang, dan B. Yener. “On the Security of Key Extraction from Measuring Physical Quantities,” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 8, hal. 1796-1806, Agustus 2016.
A. Badawy, T. Khattab, T. Elfouly, A. Mohamed, D. Trinchero, “Secret Key Generation Based on Channel and Distance Measurements,” 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT, 2014, hal. 136–142.
J. Zhang, T. Q. Duong, A. Marshall, dan R. Woods, “Key Generation from Wireless Channels: A Review,” IEEE Access, Vol. 4, hal. 614–626, 2016.
M. Yuliana, Wirawan, dan Suwadi, “Performance Evaluation of the Key Extraction Schemes in Wireless Indoor Environment,” Proceedings - International Conference on Signals and Systems, ICSigSys 2017, 2017, hal. 138-144.
C. Ye, S. Mathur, A. Reznik, Y. Shah,W. Trappe, dan N. B. Mandayam, “Information-Theoretically Secret Key Generation for Fading Wireless Channels,” IEEE Trans. Inf. Forensics Security, Vol. 5, No. 2, hal. 240– 254, 2010.
© Jurnal Nasional Teknik Elektro dan Teknologi Informasi, under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License.