Secret Key Generation Using Short Blocklength Polar Coding Over Wireless Channels

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

Secret Key Generation Using Short Blocklength Polar Coding Over Wireless Channels

Henri Hentilä; Yanina Y. Shkel; Visa Koivunen

This paper investigates the problem of secret key generation from correlated Gaussian random variables in the short blocklength regime. Short blocklengths are commonly employed in massively connected IoT sensor networks in 5G and beyond wireless systems. Polar codes have previously been shown to be applicable to the secret key generation problem, and are known to perform well for short blocklengths in the channel coding context. Inspired by these findings, we propose an explicit protocol based on polar codes for generating secret keys in the short blocklength regime. This protocol differs from previously proposed key generation protocols based on polar coding in two main ways: (i) we consider a Gaussian source for the key generation; (ii) we focus on the short blocklength regime. Simulation results show that the proposed protocol performs well even for very short blocklengths, especially if one can relax the BER/BLER requirements for the generated keys. They also demonstrate that the polar code based protocol outperforms a similar one using LDPC codes in place of polar codes, and that this advantage grows the shorter the blocklength becomes.

The Internet-of-Things (IoT) consists of large-scale sensor networks dispersed over wide areas that perform sensing, inference, monitoring, and control tasks. The individual sensors in such networks are typically battery-operated and designed to have long life spans, and as a result have limited communication and computation capabilities. In addition, their communication may be subject to strict latency and security/privacy requirements. Low-complexity generation and management of encryption keys under short packet communication are prime enablers for such sensor networks, and the topic of this paper.

SPS on Twitter

  • The DEGAS Webinar Series continues on 1 February when Dr. Francesca Parise presents "Tractable Network Intervention…
  • The Brain Space Initiative Talk Series continues this Friday, 27 January when Dr. Fan Lam presents "Quantitative, M…
  • CALL FOR PAPERS: The IEEE Transactions on Multimedia is accepting submissions for a Special Issue on When Multimedi…
  • As part of our 75th anniversary celebration, we're holding monthly trivia contests all year long! Enter now for the…
  • New SPS Webinar: On 13 February, join Dr. Harshit Gupta when he presents "CryoGAN: A New Reconstruction Paradigm fo…

SPS Videos

Signal Processing in Home Assistants


Multimedia Forensics

Careers in Signal Processing             


Under the Radar