Secret Key Generation Using Short Blocklength Polar Coding Over Wireless Channels

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

Secret Key Generation Using Short Blocklength Polar Coding Over Wireless Channels

Henri Hentilä; Yanina Y. Shkel; Visa Koivunen

This paper investigates the problem of secret key generation from correlated Gaussian random variables in the short blocklength regime. Short blocklengths are commonly employed in massively connected IoT sensor networks in 5G and beyond wireless systems. Polar codes have previously been shown to be applicable to the secret key generation problem, and are known to perform well for short blocklengths in the channel coding context. Inspired by these findings, we propose an explicit protocol based on polar codes for generating secret keys in the short blocklength regime. This protocol differs from previously proposed key generation protocols based on polar coding in two main ways: (i) we consider a Gaussian source for the key generation; (ii) we focus on the short blocklength regime. Simulation results show that the proposed protocol performs well even for very short blocklengths, especially if one can relax the BER/BLER requirements for the generated keys. They also demonstrate that the polar code based protocol outperforms a similar one using LDPC codes in place of polar codes, and that this advantage grows the shorter the blocklength becomes.

The Internet-of-Things (IoT) consists of large-scale sensor networks dispersed over wide areas that perform sensing, inference, monitoring, and control tasks. The individual sensors in such networks are typically battery-operated and designed to have long life spans, and as a result have limited communication and computation capabilities. In addition, their communication may be subject to strict latency and security/privacy requirements. Low-complexity generation and management of encryption keys under short packet communication are prime enablers for such sensor networks, and the topic of this paper.

SPS on Twitter

  • CALL FOR PROPOSALS: The IEEE Workshop on Automatic Speech Recognition and Understanding is now soliciting proposals…
  • authors have started uploading their conference slides and posters to IEEE SPS SigPort! Get a sneak pea…
  • DEADLINE EXTENDED: The IEEE Journal of Selected Topics in Signal Processing is accepting papers for a Special Issue…
  • Voting for the IEEE SPS 5-Minute Video Clip Contest is now live! Check out the three finalists and cast your vote f…
  • CALL FOR PROPOSALS: Now seeking proposals for the 2024 IEEE International Workshop on Machine Learning for Signal P…

SPS Videos

Signal Processing in Home Assistants


Multimedia Forensics

Careers in Signal Processing             


Under the Radar