Issue
Security and Safety
Volume 3, 2024
Security and Safety in Physical Layer Systems
Article Number 2023033
Number of page(s) 16
Section Information Network
DOI https://doi.org/10.1051/sands/2023033
Published online 31 January 2024

© The Author(s) 2024. Published by EDP Sciences and China Science Publishing & Media Ltd.

Licence Creative CommonsThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

1. Introduction

The inherent openness of wireless channels makes it difficult to thoroughly address wireless communication security issues such as eavesdropping. With the growing popularity of applications such as smart homes, the Internet of Vehicles, and telemedicine, wireless communication’s security problems have become more serious. Therefore, finding a fundamental solution to ensure wireless communication security is an urgent issue that needs to be addressed. In recent years, secret key generation based on wireless channels (WC-SKG) has attracted widespread attention as a potential solution to these security problems. By utilizing the physical characteristics of reciprocity, time-variability, and irrelevance in wireless channels, legitimate communication nodes can generate keys, thereby achieving “information theory” security.

The traditional WC-SKG scheme consists of four steps: channel detection, quantization, information reconciliation, and privacy amplification. During the channel detection step, both legitimate communication nodes broadcast their detection signals to one other to obtain channel state information (CSI), such as channel frequency response (CFR) and channel impulse response (CIR). The CSI is then fed to the quantizer, which transforms it from a continuous value into either 0 or 1 bits to generate the initial key bits. Due to various effects such as noise and signal distortion during transmission, both legitimate parties may end up with different initial key bits. Consequently, it is necessary to eliminate the inconsistency through information reconciliation, i.e., the legitimate communication parties share error correction information through a public error-free channel. Regrettably, this process may expose confidential information via public channels. Hence, the privacy amplification step becomes necessary to eliminate any unintentional leakage and create the ultimate secret key bits. In summary, channel detection is essential to the entire key generation, which dictates the upper limit of the scheme’s performance.

The main factors that affect channel consistency include variations in receiver hardware differences, asynchronous transmission measurements, and estimation errors. For the problem of receiver hardware differences, a difference feedback mechanism [1] can be employed as these differences are often fixed across both parties. For the problem of the Doppler shift resulting from asynchronous measurements, Zhang’s [2] theoretical analysis demonstrates that in general slow-fading communication scenarios, this factor has minimal influence and can be ignored. As for the problem of estimation error, it is hard to solve due to factors like the estimation algorithm of the communication system itself and the number of pilots, but it can be mitigated by using smoothing algorithms or orthogonal transformations.

For the smoothing algorithm, Ambekar et al.[3] use polynomial regression to fit the channel. However, this method will smooth the channel into a low-order polynomial, which reduces the achievable secret key generation rate (SKGR). To overcome the limitations of manual parameter design in smoothing algorithms and enhance adaptability, current research primarily focuses on preprocessing methods based on orthogonal transformations. These methods assume that the shared random source between legitimate communication parties is composed of arrival paths with varying delays and noise affects these paths differently. Simply eliminating heavily affected paths by noise can significantly improve overall consistency. Li et al. [4] proposed a principal component analysis (PCA) algorithm to improve consistency and conducted a theoretical analysis of orthogonal transformation-based preprocessing methods. The PCA algorithm utilizes the correlation matrix’s feature matrix as the transformation matrix and extracts high-power components for key generation.

In conclusion, channel estimation errors, which are influenced by factors such as the number of pilots, channel environment, and channel estimation algorithms used in the communication process, are the primary cause of poor consistency between legitimate communication parties. However, the existing WC-SKG scheme relies on orthogonal transformations to reduce the key inconsistency rate (KIR) at the expense of sacrificing a portion of SKGR, which is not the most effective solution.

To address the above problem, Wang et al. [5] showed that most of the current research on WC-SKG schemes only focuses on pilot-based approaches, neglecting the potential SKGR gain from the transmitted power of data symbols. Wang discovered not only can channel information be obtained from pilot symbols, but correctly demodulated data symbols can also be used as pilots to obtain channel information. However, Wang only provided a theoretical analysis that utilizing correctly demodulated data symbols as pilots can effectively improve the consistency of channel estimation for legitimate users, without providing a practical algorithm or implementation.

To address this issue, this paper proposes a novel consistency enhancement algorithm that leverages constellation decision information and designs a WC-SKG scheme. The main contributions of this article are as follows:

  • A consistency enhancement algorithm based on constellation decision information (CEA-CDI) is proposed to enhance SKGR. The algorithm is designed based on the principle of the EM algorithm and has been improved according to the propagation mechanism of the signal.

  • We add a consistency enhancement step to the traditional WC-SKG scheme and design a complete key generation scheme. The consistency enhancement step can effectively improve the correlation between the legitimate parties, thereby reducing the KIR and the overhead from information reconciliation, ultimately improving the overall scheme performance.

  • We conduct simulations and evaluate the normalized mean square error (NMSE) and SKGR under various signal-to-noise ratios (SNRs) from five perspectives: the number of symbols, the number of subcarriers, bandwidth, channel condition, and channel estimation methods. The simulation results show that the CEA-CDI algorithm makes use of both pilot symbols and soft decision information from data symbols to improve the accuracy of channel estimation and SKGR.

The remainder of this paper is as follows. Section 2 introduces the system model. Section 3 presents a key generation scheme based on CEA-CDI. In Section 4, the complexity analysis is provided. In Section 5, the simulation analysis of the algorithm’s impact on OFDM signals is conducted. Finally, Section 6 concludes this paper.

2. System model

2.1. Wireless channel model

The traditional WC-SKG model is considered the system model [5]. Alice, Bob, and Eve are the three single antenna users in the scene. Alice and Bob are legal communication users, exchanging a frame of pilot-data symbols within the coherence time Tn(n=1,2,…). Figure 1 shows the communication process between them. Eve is an illegal eavesdropping user. Assuming that its distance from Alice and Bob exceeds several wavelengths, Eve’s channel can be regarded as independent of Alice and Bob’s channel. Consequently, the impact of Eve will not be considered in subsequent analyses. The communication behavior of Alice and Bob can be represented as

thumbnail Figure 1.

Communication process between Alice and Bob

{ y A = h BA x B + w A y B = h AB x A + w B , $$ \begin{aligned} \left\{ {{\begin{array}{*{20}c} {y_{A} =h_{BA} x_{B} +w_{A} } \\ {y_{B} =h_{AB} x_{A} +w_{B} } \\ \end{array} }} \right., \end{aligned} $$(1)

where hAB, hBA respectively represent the CIR of Alice to Bob and Bob to Alice, xA, xB respectively represent the sending signals of Alice and Bob, and wA, wB respectively represent the receiving noise at Alice and Bob. Alice and Bob can obtain the channel through channel estimation as

{ h ̂ A = h BA + e A h ̂ B = h AB + e B , $$ \begin{aligned} \left\{ {{\begin{array}{*{20}c} {\hat{{h}}_{A} =h_{BA} +e_{A} } \\ {\hat{{h}}_{B} =h_{AB} +e_{B} } \\ \end{array} }} \right., \end{aligned} $$(2)

where h ̂ A , h ̂ B $ \hat{{h}}_{A} ,\hat{{h}}_{B} $ represent the channel estimation eA, eB represents estimation error.

The wireless signal propagation channel between Alice and Bob, which consists of many electromagnetic waves that are reflected, dispersed, and refracted, is an ideal random source in WC-SKG. The CIR of a multipath Rayleigh fading channel with L taps can be expressed as

h ( q ) = l = 0 L 1 h l δ ( q τ l ) , $$ \begin{aligned} h\left( q \right)=\sum \limits _{l=0}^{L-1} {h_{l} \delta \left( {q-\tau _{l} } \right)} , \end{aligned} $$(3)

where h(q) represents the q-th sample point of CIR and q should no larger than the total number of samples for a symbol. hl represents the l-th path of the received signal. When there are abundant paths in the environment, it can be considered hl as a zero mean cyclic symmetric complex Gaussian (ZMCSCG) random variable, and the different propagation paths are irrelevant. hl follows h l C N ( 0 , σ l 2 ) $ h_{l} \sim {\cal C}{\cal N}\left( {0,\sigma_{l}^{2}} \right) $ and σ l 2 = P · τ l $ \mathop{\sum}{\sigma_{l}^{2} =P \cdot \tau _{l}} $ represents the delay of l-th path L represents the total number of paths δ(⋅) represents pulse function.

2.2. OFDM model

The current popular communication systems almost use OFDM modulation such as LTE, WiFi, etc. So, the legitimate users utilize OFDM modulation to communicate are assumed. In each OFDM symbol, the first is the pilot symbol, the last K-1 are data symbols, and each symbol has equal power. Both Alice and Bob transmit K OFDM symbols on M subcarriers in the coherence time Tn. The OFDM system’s basic transmitting and receiving process is shown in Figure 2.

thumbnail Figure 2.

Basic transmitting and receiving process of the OFDM system

When transmitting OFDM signals, the information bits-stream first modulates to obtain D data symbols (constellation mapping). D data symbols form the frequency domain signal X which consists of M subcarriers and K-1 OFDM symbols (D = M(K−1)). Then insert one known pilot symbol and OFDM modulate it to obtain the time domain signal x, which can be represented as

x k ( q ) = 1 M m = 0 M 1 X k ( m ) e j 2 π n q / M , $$ \begin{aligned} x_{k} \left( q \right)=\frac{1}{\sqrt{M} }\sum \limits _{m=0}^{M-1} {X_{k} \left( m \right)e^{j2\pi nq/M}} , \end{aligned} $$(4)

where xk(q) represents the time domain transmission signal of the q-th sample point of the k-th symbol Xk(m) represents the frequency domain transmission signal of the m-th subcarrier of the k-th symbol.

To avoid intersymbol interference the cyclic prefix (CP) is added to the OFDM signal, which is then transmitted through the multipath fading channel with additive Gaussian white noise (AWGN).

Assuming that the receiver synchronization performs well, the multipath fading channel remains unchanged within 2 × K OFDM symbols (Alice and Bob complete a round of alternating transmitting and receiving), and the CIR length is less than the CP length, the received signal after removing the CP can be represented as

y k ( q ) = l = 0 L 1 h ( l ) x k ( q l ) + w k ( q ) , $$ \begin{aligned} y_{k} \left( q \right)=\sum \limits _{l=0}^{L-1} {h\left( l \right)x_{k} \left( {q-l} \right)+w_{k} \left( q \right)} , \end{aligned} $$(5)

where yk(q) represents the time-domain received signal of the q-th sample point of the k-th symbol. wk(q) represents AWGN and follows w k ( q ) C N ( 0 , σ w 2 ) $ w_{k} \left( q \right)\sim {\cal C}{\cal N}\left( {0,\sigma_{w}^{2}} \right) $. Then, the time-domain received signal through OFDM demodulating to obtain an equivalent frequency-domain received signal, which can be expressed as

Y k ( m ) = 1 M q = 0 M 1 y k ( q ) e j 2 π m q / M = H ( m ) X k ( m ) + W k ( m ) , $$ \begin{aligned} Y_{k} \left( m \right)&=\frac{1}{\sqrt{M} }\sum \limits _{q=0}^{M-1} {y_{k} \left( q \right)e^{-j2\pi mq/M}} \\&=H\left( m \right)X_{k} \left( m \right)+W_{k} \left( m \right)\nonumber , \end{aligned} $$(6)

where Xk(m)​, Wk(m) represent frequency-domain symbols and noise at the m-th subcarrier of the k-th symbol, respectively. And Wk(m) follows W k ( m ) C N ( 0 , σ W 2 ) , σ W 2 = M σ w 2 $ W_{k} \left( m \right)\sim {\cal C}{\cal N}\left( {0,\sigma_{W}^{2}} \right)\!, \sigma_{W} ^{2}=M\sigma_{w}^{2} $. Since we have assumed that the channel remains unchanged within a coherence time, the CFR of all symbols at the m-th subcarrier of the same symbol is expressed as H(m).

CFR is the frequency-domain representation of CIR, which can be expressed as

H ( m ) = l = 0 L 1 h l e j 2 π m l M . $$ \begin{aligned} H\left( m \right)=\sum \limits _{l=0}^{L-1} {h_{l} e^{{-j2\pi ml} \mathord {\left. \right. } M}} . \end{aligned} $$(7)

Since H(m) is a linear change of hl and each channel tap hl is a ZMCSCG random variable, H(m) is also a ZMCSCG random variable. It can be deduced from Pascal’s discrete theorem that

1 M m = 0 M 1 | H ( m ) | 2 = l = 0 L 1 | h l | 2 . $$ \begin{aligned} \frac{1}{M}\sum \limits _{m=0}^{M-1} {\left| {H\left( m \right)} \right|^{2}} =\sum \limits _{l=0}^{L-1} {\left| {h_{l} } \right|^{2}} . \end{aligned} $$(8)

So, H(m) also follows H ( m ) C N ( 0 , P ) $ H\left( m \right)\sim {\cal C}{\cal N}\left( {0,P} \right) $. The CFR estimation of Alice and Bob can be expressed as

{ H ̂ A ( m ) = H BA ( m ) + E A ( m ) H ̂ B ( m ) = H AB ( m ) + E B ( m ) , $$ \begin{aligned} \left\{ {{\begin{array}{*{20}c} {\hat{{H}}_{A} \left( m \right)=H_{BA} \left( m \right)+E_{A} \left( m \right)} \\ {\hat{{H}}_{B} \left( m \right)=H_{AB} \left( m \right)+E_{B} \left( m \right)} \\ \end{array} }} \right., \end{aligned} $$(9)

where H ̂ A ( m ) , H ̂ B ( m ) $ \hat{{H}}_{A} ( m ),\hat{{H}}_{B} \left( m \right) $ represent the CFR estimation of Alice and Bob for the received signal, respectively. HAB(m),HBA(m) represent the CFR of the m-th carrier from Alice to Bob and Bob to Alice, respectively, which follows H AB ( m ) , H BA ( m ) C N ( 0 , P ) $ H_{AB} ( m ),H_{BA} \left( m \right)\sim {\cal C}{\cal N}\left( {0,P} \right) $. EA(m), EB(m) represent the estimation error of CFR, which follows E A ( m ) C N ( 0 , σ E A 2 ) $ E_{A} \left( m \right)\sim {\cal C}{\cal N}\left( {0,\sigma_{E_{A} }^{2} } \right) $, E B ( m ) C N ( 0 , σ E B 2 ) $ E_{B} \left( m \right)\sim {\cal C}{\cal N}\left( {0,\sigma _{E_{B} }^{2} } \right) $.

For the initial channel estimation of the pilot, we employ the least-squares (LS) method, which is expressed as

H ̂ ( 0 ) ( m ) = Y 1 ( m ) X p ( m ) = H ( m ) + W 1 ( m ) X p ( m ) = H ( m ) + E ( 0 ) ( m ) . $$ \begin{aligned} \hat{{H}}^{(0)}\left( m \right)&=\frac{Y_{1} \left( m \right)}{X_{p} \left( m \right)}=H\left( m \right)+\frac{W_{1} \left( m \right)}{X_{p} \left( m \right)} \\&=H\left( m \right)+E^{(0)}\left( m \right) \nonumber . \end{aligned} $$(10)

Due to |Xp|2 = 1, the initial estimation error of CFR is E ( 0 ) ( m ) C N ( 0 , σ W 2 ) $ E^{(0)}\left( m \right)\sim {\cal C}{\cal N}\left( {0,\sigma_{W}^{2}} \right) $.

The received data symbols are then transmitted to channel equalizer and constellation demapping. Finally, bits-stream are obtained through the decision.

3. Secret key generation scheme based on CEA-CDI

3.1. WC-SKG scheme

A general key generation scheme should include channel detection, quantization, information reconciliation, and privacy amplification. To reduce the initial KID and avoid the need for feedback on a large amount of data during information reconciliation, this paper designs the CEA-CDI algorithm to improve channel consistency between legitimate users. Figure 3 shows the WC-SKG scheme.

  • (1)

    Channel detection

Figure 3 shows that Alice and Bob must complete their communication within the coherence time and each needs to transmit one pilot symbol and K-1 data symbols. This process is consistent with current communication systems based on pilot-data frames, such as LTE uplink signals in which two demodulation reference signal (DMRS) symbols are inserted into a frame for channel estimation [6].

  • (2)

    Consistency enhancement

Alice and Bob use the pilot symbol to complete initial channel estimation, followed by consistency enhancement using the CEA-CDI algorithm (detailed in Section 3.2). The process results of the CEA-CDI algorithm are shown in Figure 4. Figure 4a shows the true CFR (without noise). Figure 4b shows the initial channel estimation based on the pilot symbol. Noise and poor consistency significantly impact Alice and Bob’s initial channel estimation. Figure 4c shows the results of consistency enhancement using the CEA-CDI algorithm, which demonstrates intuitively that the CEA-CDI algorithm is more accurate than the initial channel estimation.

  • (3)

    Quantization

The purpose of quantification is to convert continuous CFR into discrete 0, 1 initial key bits. The equiprobability quantization algorithm is used to achieve a uniform number of 0 and 1 bits after quantization. The quantization interval of the equal probability quantization algorithm can be expressed as

q i p ( x ) d x = i v , $$ \begin{aligned} \int \limits _{-\infty }^{q_{i} } {p\left( x \right)\mathrm{d}x} =\frac{i}{v}, \end{aligned} $$(11)

thumbnail Figure 3.

WC-SKG scheme

thumbnail Figure 4.

The process results of consistency enhancement: (a) True channel (without noise); (b) Initial channel estimation (Eb/N0 = 5 dB); (c) CEA-CDI enhanced channel (Eb/N0 = 5 dB)

where v denotes the number of quantization thresholds, qi represents the i-th threshold value, and p(x) represents the probability of x within a quantization interval.

We use the secret key inconsistency ratio (KIR) to evaluate the inconsistent number of key bits after quantization, which is not only related to the quantization algorithm, but also to the consistency of channel estimation. KIR is a commonly used indicator that can be expressed as

KIR = i = 1 LEN XOR ( K A ( i ) , K B ( i ) ) LEN $$ \begin{aligned} \mathrm{KIR}=\frac{\sum \limits _{i=1}^{\mathrm{LEN}} \mathrm{XOR} ({K_{A} (i),K_{B} (i)})}{\mathrm{LEN}} \end{aligned} $$(12)

where XOR(⋅) represents XOR operation; KA and KB represent Alice and Bob’s initial key bits after quantization, respectively; LEN represents the length of the initial key bit.

  • (4)

    Information reconciliation

Despite consistency enhancement having been added to the WC-SKG scheme, there may still be incorrect key bits after quantization due to noise. Consequently, information reconciliation is still required to eliminate inconsistent bits between legitimate communication parties to obtain consistent keys for symmetric encryption. We employ a method of information reconciliation based on error-correcting encoding. We can calculate the KIR at various signal-to-noise ratios in advance and then select BCH codes with multiple rates. As stated in consistency enhancement, CEA-CDI can enhance the consistency of channels between legitimate communication parties, thereby reducing KIR. When KIR is low, the higher rate of error correction coding can be used to conserve communication bandwidth because the rate of error correction coding is inversely proportional to KIR. Different KIRs require varying BCH (n, k, t), where n is the length of the BCH codeword; k is the length of the information bit in the BCH codeword, and t is the maximum number of errors the BCH code can correct.

  • (5)

    Privacy amplification

Because Alice must send the error-corrected information to Bob through a public channel during information reconciliation, Eve can also use this information to correct his key. Although there may be a significant distinction between Eve and legitimate channels, it is hard to prevent information from leaking. Therefore, based on the residual hash lemma [2], the leaking key bits can be reduced by using the SHA1 function. Then we can generate the final secure key sequence.

3.2. Consistency enhancement algorithm based on constellation decision information

The conventional WC-SKG schemes only use pilot symbols for channel estimation, resulting in low accuracy and inconsistent channel estimation between Alice and Bob. This limitation arises from the fact that these schemes do not fully exploit the power of transmitted signals. To address this issue, we aim to design a method for channel estimation that can simultaneously make use of both pilot symbols and data symbols.

To improve channel estimation accuracy before decoding, we need to consider how to effectively utilize the information obtained from constellation decision. Unfortunately, using pilot-assisted channel estimation methods is not feasible since the receiver needs to know the transmitted data symbols before making a constellation decision. The bits obtained after the decision will no longer contain information about the channel impact. Furthermore, once an error in decision-making has occurred and the error bits have been used to correct the initial channel estimation, the expected gain may not be achieved. Therefore, it is crucial to determine how to make a soft decision on the signal after channel equalization, acquire soft symbol information, and use this information to improve the initial channel estimation without knowing the transmission symbol. Based on these considerations, we propose a consistency enhancement algorithm based on constellation decision information (CEA-CDI) that is based on the EM algorithm principle.

The EM algorithm [7] is a method for iteratively reaching the maximum likelihood solution in the condition of missing variables. It can iteratively approach the maximum likelihood solution of CFR by calculating the soft symbol information of the received data symbol without knowing the specific transmission data symbol. The Expectation step(E-step) and the Maximum step(M-step) are the two main parts of the EM’s iterative process.

Alice or Bob obtains the initial channel estimation at the m-th subcarrier during the channel detection stage, the E-step and the M-step can be written as

E-step:

Q ( H ( m ) | H ( p ) ( m ) ) = E X { log f ( Y ( m ) , X ( m ) | H ( m ) ) | Y ( m ) , H ( p ) ( m ) } , $$ \begin{aligned} Q\left( {H\left( m \right)\vert H^{(p)}\left( m \right)} \right)=E_{X} \left\{ {\log f\left( {Y( m ),X\left( m \right)\vert H\left( m \right)} \right)\vert Y( m ),H^{(p)}\left( m \right)} \right\} , \end{aligned} $$(13)

M-step:

H em ( p + 1 ) ( m ) = arg max H Q ( H ( m ) | H ( p ) ( m ) ) , $$ \begin{aligned} H_{em}^{(p+1)} \left( m \right)=\mathop \mathrm{arg\,max }\limits _{H} Q\left( {H\left( m \right)\vert H^{(p)}\left( m \right)} \right), \end{aligned} $$(14)

where H(p)(m) represents the channel estimation of the p-th iteration. According to the Bayesian formula, (13) can be written as

Q ( H ( m ) | H ( p ) ( m ) ) = E X { log [ f ( X | H ( m ) ) f ( Y k ( m ) | H ( m ) , X ) ] | Y ( m ) , H ( p ) ( m ) } = i = 1 C k = 1 K log [ f ( X i | H ( m ) ) f ( Y k ( m ) | H ( m ) , X i ) ] f ( X i | Y k ( m ) , H ( m ) ) = i = 1 C k = 1 K log [ 1 C f ( Y k ( m ) | H ( m ) , X i ) ] f ( X i | Y k ( m ) , H ( m ) ) = i = 1 C k = 1 K log [ 1 C f ( Y k ( m ) | H ( m ) , X i ) ] f ( Y k ( m ) | X i , H ( p ) ( m ) ) f ( X i | H ( p ) ( m ) ) f ( Y k ( m ) | H ( p ) ( m ) ) = i = 1 C k = 1 K log [ 1 C f ( Y k ( m ) | H ( m ) , X i ) ] f ( Y k ( m ) | X i , H ( p ) ( m ) ) C f ( Y k ( m ) | H ( p ) ( m ) ) , $$ \begin{aligned}&Q\left( {H\left( m \right)\vert H^{(p)}\left( m \right)} \right) \nonumber \\&{=}E_{X} \left\{ {\log \left[ {f\left( {X\vert H\left( m \right)} \right)f\left( {Y_{k} \left( m \right)\vert H\left( m \right)\!,X} \right)} \right]\vert Y\left( m \right)\!,H^{(p)}\left( m \right)} \right\} \nonumber \\&{=}\sum \limits _{i=1}^C {\sum \limits _{k=1}^K {\log \left[ {f\left( {X_{i} \vert H\left( m \right)} \right)f\left( {Y_{k} \left( m \right)\vert H\left( m \right)\!,X_{i} } \right)} \right]} f\left( {X_{i} \vert Y_{k} \left( m \right)\!,H\left( m \right)} \right)} \nonumber \\&{=}\sum \limits _{i=1}^C {\sum \limits _{k=1}^K {\log \left[ {\frac{1}{C}f\left( {Y_{k} \left( m \right)\vert H\left( m \right)\!,X_{i} } \right)} \right]} f\left( {X_{i} \vert Y_{k} \left( m \right)\!,H\left( m \right)} \right)} \\&=\sum \limits _{i=1}^C {\sum \limits _{k=1}^K {\log } } \left[ {\frac{1}{C}f\left( {Y_{k} \left( m \right)\vert H\left( m \right)\!,X_{i} } \right)} \right]\frac{f\left( {Y_{k} \left( m \right)\vert X_{i}\!,H^{(p)}\left( m \right)} \right)f\left( {X_{i} \vert H^{(p)}\left( m \right)} \right)}{f\left( {Y_{k} \left( m \right)\vert H^{(p)}\left( m \right)} \right)} \nonumber \\&=\sum \limits _{i=1}^C {\sum \limits _{k=1}^K {\log } } \left[ {\frac{1}{C}f\left( {Y_{k} \left( m \right)\vert H\left( m \right)\!,X_{i} } \right)} \right]\frac{f\left( {Y_{k} \left( m \right)\vert X_{i}\!,H^{(p)}\left( m \right)} \right)}{Cf\left( {Y_{k} \left( m \right)\vert H^{(p)}\left( m \right)} \right)}, \nonumber \end{aligned} $$(15)

where Xi is a known constellation symbol, C is the modulation order. If x is modulated by QPSK, then C  = 4 and X i = { 1 + i , 1 i , 1 i , 1 + i } / 2 $ X_{i} =\left\{ {1+i,1-i,-1-i,-1+i} \right\}/\sqrt 2 $.

According to (6), noise follows ZMCSCG, so when H(p)(m) and Xi are known, the conditional probability of Yk(m) is

f ( Y k ( m ) | H ( p ) ( m ) , X i ) = 1 π σ W 2 exp ( | Y k ( m ) H ( p ) ( m ) X i | 2 σ W 2 ) . $$ \begin{aligned} f\left( {Y_{k} \left( m \right)\vert H^{(p)}\left( m \right)\!,X_{i} } \right)=\frac{1}{\pi \sigma _{W}^{2}}\exp \left( {-\frac{\left| {Y_{k} \left( m \right)-H^{(p)}\left( m \right)X_{i} } \right|^{2}}{\sigma _{W} ^{2}}} \right). \end{aligned} $$(16)

And when H(p)(m) is known, the conditional probability of Yk(m) is

f ( Y k ( m ) | H ( p ) ( m ) ) = i C 1 π σ W 2 exp ( | Y k ( m ) H ( p ) ( m ) X i | 2 σ W 2 ) . $$ \begin{aligned} f\left( {Y_{k} \left( m \right)\vert H^{(p)}\left( m \right)} \right)=\sum \limits _i^C {\frac{1}{\pi \sigma _{W}^{2}}\exp \left( {-\frac{\left| {Y_{k} \left( m \right)-H^{(p)}\left( m \right)X_{i} } \right|^{2}}{\sigma _{W}^{2}}} \right)} . \end{aligned} $$(17)

According to (16) and (17), (14) can be further written as

H em ( p + 1 ) ( m ) = arg max H i = 1 C k = 1 K log { 1 C f ( Y k ( m ) | H ( m ) , X i ) } f ( Y k ( m ) | X i , H ( p ) ( m ) ) C f ( Y d | H ( p ) ( m ) ) = arg min H i = 1 C k = 1 K | Y d H X i | 2 f ( Y k ( m ) | X i , H ( p ) ( m ) ) f ( Y k ( m ) | H ( p ) ( m ) ) . $$ \begin{aligned}&H_{em}^{(p+1)} \left( m \right) \nonumber \\&=\mathop \mathrm{arg\,max }\limits _{H} \sum \limits _{i=1}^C {\sum \limits _{k=1}^K {\log } } \left\{ {\frac{1}{C}f(Y_{k} \left( m \right)\vert H\left( m \right)\!,X_{i} )} \right\} \frac{f(Y_{k} \left( m \right)\vert X_{i} ,H^{(p)}\left( m \right))}{Cf(Y^{d}\vert H^{(p)}\left( m \right))} \\&=\mathop \mathrm{arg\,min }\limits _{H} \sum \limits _{i=1}^C {\sum \limits _{k=1}^K {\vert Y^{d}-HX_{i} \vert ^{2}\frac{f(Y_{k} \left( m \right)\vert X_{i} ,H^{(p)}\left( m \right))}{f(Y_{k} \left( m \right)\vert H^{(p)}\left( m \right))}} }\nonumber . \end{aligned} $$(18)

Taking the derivative of (18) results in

H em ( p + 1 ) ( m ) = [ i = 1 C k = 1 K | X i | 2 f ( Y k ( m ) | X i , H ( p ) ( m ) ) f ( Y k ( m ) | H ( p ) ( m ) ) ] 1 × [ i = 1 C k = 1 K Y k ( m ) X i f ( Y k ( m ) | X i , H ( p ) ( m ) ) f ( Y k ( m ) | H ( p ) ( m ) ) ] . $$ \begin{aligned} H_{em}^{^{(p+1)}} \left( m \right)&=\left[ {\sum \limits _{i=1}^C {\sum \limits _{k=1}^K \vert } X_{i} \vert ^{2}\frac{f\left( {Y_{k} \left( m \right)\vert X_{i} ,H^{(p)}\left( m \right)} \right)}{f(Y_{k} \left( m \right)\vert H^{(p)}\left( m \right))}} \right]^{-1} \\&\quad \times \left[ {\sum \limits _{i=1}^C {\sum \limits _{k=1}^K {Y_{k} \left( m \right)} } X_{i}^{*}\frac{f(Y_{k} \left( m \right)\vert X_{i} ,H^{(p)}\left( m \right))}{f(Y_{k} \left( m \right)\vert H^{(p)}\left( m \right))}} \right].\nonumber \end{aligned} $$(19)

Furthermore, by incorporating (16) and (17) into (19), the simplified result of the EM algorithm’s (p + 1)-th iteration is

H em ( p + 1 ) ( m ) = 1 CK k = 1 K [ Y k ( m ) i = 1 C X i exp ( | Y k ( m ) H ( p ) ( m ) X i | 2 σ W 2 ) i = 1 C exp ( | Y k ( m ) H ( p ) ( m ) X i | 2 σ W 2 ) ] . $$ \begin{aligned} H_{em}^{^{(p+1)}} \left( m \right)=\frac{1}{CK}\sum \limits _{k=1}^K {\left[ {Y_{k} \left( m \right)\frac{\sum \limits _{i=1}^C {X_{i}^{*}\exp \left( {-\frac{\left| {Y_{k} \left( m \right)-H^{(p)}\left( m \right)X_{i} } \right|^{2}}{\sigma _{W}^{2}}} \right)} }{\sum \limits _{i{=}1}^C {\exp \left( {-\frac{\left| {Y_{k} \left( m \right)-H^{(p)}\left( m \right)X_{i} } \right|^{2}}{\sigma _{W}^{2}}} \right)} }} \right]} . \end{aligned} $$(20)

Extracting a portion of (20) yields (21). Ω k ( p + 1 ) ( m ) $ \Omega_{k}^{\left( {p+1} \right)} \left( m \right) $ represents the soft decision information of the constellation symbol, which is based on the weighted average of received data symbols for each symbol in the constellation.

Ω k ( p + 1 ) ( m ) = i = 1 C X i f ( Y k ( m ) | X i , H ( p ) ( m ) ) i = 1 C f ( Y k ( m ) | X i , H ( p ) ( m ) ) . $$ \begin{aligned} \Omega _{k}^{\left( {p+1} \right)} \left( m \right)=\frac{\sum \limits _{i=1}^C {X_{i}^{*}f\left( {Y_{k} \left( m \right)\vert X_{i} ,H^{(p)}\left( m \right)} \right)} }{\sum \limits _{i=1}^C {f\left( {Y_{k} \left( m \right)\vert X_{i} ,H^{(p)}\left( m \right)} \right)} }. \end{aligned} $$(21)

The EM algorithm calculates the probability of received symbols regarding each modulation symbol and derives the soft decision information of received symbols instead of directly using hard decisions. In this way, it can preserve the influence of the channel on the received data symbols to the utmost extent.

Since the CIR is usually much shorter than the symbol length, the estimation error in the actual non-existent path can be eliminated by truncating the result of iterative estimation (20) in the time domain. Here we assume that the CIR length L is known (in reality, L is an unknown parameter that can be estimated) and we simply use the length of CP as the upper bound of L, since CP is usually set to be longer than L. So, we use inverse Fourier transformation on the result of the EM iterative estimation Hem (p + 1) to obtain hem (p + 1) , then, set the hem (p + 1) (q) = 0 when q >  L, which can be expressed as

h ( p + 1 ) ( q ) = { h em ( p + 1 ) ( q ) q L 0 q > L . $$ \begin{aligned} h^{\left( {p+1} \right)}\left( q \right)=\left\{ {{\begin{array}{*{20}c} {h_{em}^{\left( {p+1} \right)} \left( q \right)}&{q\le L} \\ 0&{q>L} \\ \end{array} }} \right.. \end{aligned} $$(22)

Then use the Fourier transform on h (p + 1) to obtain H(p + 1). Once the difference between H(p + 1) and H(p) is small enough, i.e., ∥H(q + 1)H(q)2 <  δ, the iteration process stops.

thumbnail Figure 5.

CEA-CDI process

Based on the above reduction and improvement, we propose CEA-CDI (Figure 5). The specific algorithm steps are as shown in Table 1.

Table 1.

CEA-CDI

By using Algorithm 1, the iterative effect in the above formula can be achieved equivalently.

3.3. Analysis of secret key generation rate

Secret key generation rate (SKGR) is the most commonly used metric to evaluate WC-SKG schemes. It represents the upper limit of the number of key bits that can be obtained by detecting the channel once. The SKGR R can be expressed as

R = I ( H ̂ A ; H ̂ B ) $$ \begin{aligned} R=I\left( {\hat{{H}}_{A} ;\hat{{H}}_{B} } \right) \end{aligned} $$(23)

According to (9), H ̂ A $ \hat{{H}}_{A} $ and H ̂ B $ \hat{{H}}_{B} $ are the ZMCSCG variables, so (23) can be further represented as

R = log 2 | R ̂ aa | | R ̂ bb | | R ̂ AB | $$ \begin{aligned} R=\log _{2} \frac{\left| {\mathrm{\mathbf{\hat{{R}}}}_{aa} } \right|\left| {\mathrm{\mathbf{\hat{{R}}}}_{bb} } \right|}{\left| {\mathrm{\mathbf{\hat{{R}}}}_{AB} } \right|} \end{aligned} $$(24)

The covariance matrices R ̂ $ \mathrm{\mathbf{\hat{{R}}}} $ in the above can be represented as

R ̂ aa = R HH + σ E A 2 I M $$ \begin{aligned} \mathrm{\mathbf{\hat{{R}}}}_{aa} =\mathrm{\mathbf{R}}_{HH} +\sigma _{E_{A} }^{2} I_{M} \end{aligned} $$(25)

R ̂ bb = R HH + σ E B 2 I M $$ \begin{aligned} \mathrm{\mathbf{\hat{{R}}}}_{bb} =\mathrm{\mathbf{R}}_{HH} +\sigma _{E_{B} }^{2} I_{M} \end{aligned} $$(26)

R ̂ AB = [ R ̂ aa R HH R HH R ̂ bb ] = [ R aa + σ E A 2 I M R HH R HH R bb + σ E B 2 I M ] $$ \begin{aligned} \mathrm{\mathbf{\hat{{R}}}}_{AB}&=\left[ {{\begin{array}{*{20}c} {\mathrm{\mathbf{\hat{{R}}}}_{aa} }&{\mathrm{\mathbf{R}}_{HH} } \\ {\mathrm{\mathbf{R}}_{HH} }&{\mathrm{\mathbf{\hat{{R}}}}_{bb} } \\ \end{array} }} \right] \\&=\left[ {{\begin{array}{*{20}c} {\mathrm{\mathbf{R}}_{aa} +\sigma _{E_{A} }^{2} \mathrm{I}_{M} }&{\mathrm{\mathbf{R}}_{HH} } \\ {\mathrm{\mathbf{R}}_{HH} }&{\mathrm{\mathbf{R}}_{bb} +\sigma _{E_{B} }^{2} \mathrm{I}_{M} } \nonumber \\ \end{array} }} \right]\nonumber \end{aligned} $$(27)

where RHH represents the covariance matrix of the actual channel, IM represents the identity matrix with M × M. Substituting the above covariance matrix into (24) and simplifying it, we can obtain

R = log 2 | R HH ( ( σ E A 2 + σ E B 2 ) I M + σ E A 2 σ E B 2 R HH 1 ) 1 + I M | . $$ \begin{aligned} R=\log _{2} \left| {\mathrm{\mathbf{R}}_{HH} \left( {\left( {\sigma _{E_{A} }^{2} +\sigma _{E_{B} }^{2} } \right)\mathrm{\mathbf{I}}_{M} +\sigma _{E_{A} }^{2} \sigma _{E_{B} }^{2} \mathrm{\mathbf{R}}_{HH}^{-1} } \right)^{-1}+\mathrm{\mathbf{I}}_{M} } \right|\!. \end{aligned} $$(28)

According to (28), it can be seen that the SKGR is inversely proportional to estimation error σ E A 2 , σ E B 2 $ \sigma_{E_{A} }^{2} ,\sigma_{E_{B} }^{2} $. And The simulations are conducted to find the relationship between SKGR and the number of symbols, the number of subcarriers, the channel condition in Section 5.

4. Complexity analysis

In this section, the computational complexity of the proposed CEA-CDI, hard decision feedback (HDF) method and LS method are analyzed. Following [8], we use the Θ-notation to measure the complexity with respect to K, whereby Θ(f(K)) denotes the set of functions which are bounded both above and below by f(K) asymptotically.

For the CEA-CDI, since the modulation order C is a constant, the computation of the (21) is Θ(1). And the computation of the (19) requires Θ(K) operations. According to [9], we also assume that the average number of iterations required for convergence remains almost unchanged with respect to K, i.e. Θ ( n ¯ ) Θ ( 1 ) $ \Theta \left( {\bar{{n}}} \right)\approx \Theta \left( 1 \right) $, where n ¯ $ \bar{{n}} $ is the average number of iterations required for convergence. Then, the computation of time-domain truncation is Θ(MlogM) operations due to FFT. So, we can conclude that for the CEA-CDI, the total computational complexity is [ Θ ( M ) · Θ ( K ) + Θ ( M log M ) ] · Θ ( n ¯ ) = Θ ( M K + M log M ) $ \left[ {\Theta \left( M \right)\cdot \Theta \left( K \right)+\Theta \left( {M\log M} \right)} \right]\cdot \Theta \left( {\bar{{n}}} \right)=\Theta \left( {MK+M\log M} \right) $.

For the HDF method, we use the result of (29) as extended pilot, it requires Θ(K) operations for one subcarrier. And then we take the average of the channel estimation of the extended pilot as the result of HDF. So, the computational complexity of HDF is Θ(MK).

α k ( p + 1 ) ( m ) = arg min | x X i | 2 , i = 1 , 2 , , C $$ \begin{aligned} \alpha _{k}^{\left( {p+1} \right)} \left( m \right)=\arg \min \vert x-X_{i} \vert ^{2},i=1,2,\ldots ,C \end{aligned} $$(29)

For the LS method, since we only using one pilot symbol, the computational complexity is Θ(M). The comparison of the computational complexity is summarized in Table 2.

Table 2.

Comparison of the computational complexity

5. Simulation and analysis

5.1. The setting of simulation parameters

To verify the performance of the proposed scheme, we conducted Monte Carlo simulations, and some basic OFDM parameter settings are shown in Table 3.

Table 3.

Simulation Parameters

Based on the above parameters, the average effective received SNR for each message bit is

E b N 0 = ( L cp + M ) K M ( K 1 ) C × E s N 0 . $$ \begin{aligned} \frac{E_{b} }{N_{0} }=\frac{\left( {L_{cp} +M} \right)K}{M\left( {K-1} \right)C}\times \frac{E_{s} }{N_{0} }. \end{aligned} $$(30)

In the simulation, the total power is fixed, and each symbol shares the total power equally. Meanwhile, in order to test the impact of different environments on the proposed scheme, the following two different fading models are considered in the simulation.

  • Exponential power delay (EPD) model: This model has L + 1 complex Gaussian distribution taps, and the average power of each tap hl satisfies σ l 2 = E { | h l | 2 } = σ 0 2 e T s / τ rms , l = 0 L σ l 2 = 1 $ \sigma_{l}^{2} =E\left\{ {\left| {h_{l} } \right|^{2}} \right\}=\sigma_{0}^{2} e^{-T_{s} /\tau_{rms} }, \quad \sum\limits_{l=0}^L {\sigma_{l}^{2} } =1 $. The root mean square delay is τrms = 30ns, and the channel length is L + 1 = 8 (at 10 MHz).

  • Tapped Delay Line-A (TDL-A) model $ ^{{\thinspace }} $: TDL-A is one of the channel models in 5G-NR, with a frequency range of 0.5 GHz to 100 GHz and a maximum bandwidth of 2GHz. The root mean square delay is τrms = 100ns, and the channel length is L+1=26 (at 10 MHz).

Unless otherwise specified, the EPD model is used for simulation. Meanwhile, we use data symbols as extended pilots, which is equivalent to improving the signal-to-noise ratio of channel estimation. Therefore, all traditional methods [3, , 1012] can continue to be applied after the CEA-CDI, so we have not compared them with traditional methods.

LS method, HDF method, and CEA-CDI method are compared in simulations. HDF method directly uses the result of (29) as an extended pilot and then takes the average of the channel estimation of the extended pilot as the result.

thumbnail Figure 6.

The impact of CEA-CDI: (a) NMSE; (b) SKGR

thumbnail Figure 7.

The impact of different methods on KIR

5.2. Simulation result

In our simulation studies, we focus on the impact of parameters such as the number of data symbols, the number of subcarriers, bandwidth, and channel environment on the performance of the proposed method.

Firstly, we analyzed the impact of the proposed CEA-CDI algorithm as shown in Figure 6. It can be observed that by using the CEA-CDI method, the NMSE and SKGR performances are improved by approximately 16 dB compared to the initial least squares (LS) estimation when increasing the SNR. This improvement is due to the inverse relationship between SKGR and NMSE, as indicated in (28).

Furthermore, Figure 7 illustrates the impact of different methods on the KIR. It is evident that the proposed CEA-CDI algorithm exhibits a lower KIR than other methods. Moreover, even with high quantization bits (3 bits) used, their KIR will still be lower than the LS method using low quantization bits (1 bit). This highlights the superiority of the CEA-CDI algorithm in terms of both SKGR and KIR.

Figures 810 respectively show the impact of the number of data symbols, the number of subcarriers, and bandwidth on NMSE and SKGR. Only the declared parameters are modified in Figures 810 while the other parameters remain the same as in Table 3.

thumbnail Figure 8.

The impact of the number of data symbols: (a) NMSE; (b) SKGR

thumbnail Figure 9.

The impact of the number of subcarriers: (a) NMSE; (b) SKGR

thumbnail Figure 10.

The impact of bandwidth: (a) NMSE; (b) SKGR

Figure 8 illustrates the impact of the number of data symbols. The results of 8 symbols adopt the parameters in Table 3. We then evaluate the performance of three methods by increasing the number of data symbols to 15 while keeping one pilot symbol (the total number of symbols is 16). It is observed that both the CEA-CDI method and HDF method exhibit an increase in SKGR as the number of data symbols increases. This is because they utilize data symbols as extended pilots, resulting in improved channel estimation. In contrast, the NMSE and SKGR of the LS method remain unchanged.

Figure 9 shows the impact of the number of subcarriers. We can observe that as the number of subcarriers increases, the NMSE of LS and HDF will not change. It means that once the environment and other basic parameters are determined, the number of carriers will not affect channel estimation. However, the NMSE of CEA-CDI increases as the number of subcarriers increases. This is because the number of time domain points for each OFDM symbol increases, but the channel length remains unchanged. It can obtain gain from the time-domain truncation step. We can also find that the NMSE and SKGR are not completely related, since the SKGR of LS and HDF increase as the number of subcarrier increase. This is because there is IM in SKGR according to (28) that is related to the number of subcarriers.

Figure 10 shows the impact of the bandwidth. It can be observed that only changing bandwidth will not affect the NMSE and SKGR of LS and HDF. However, it can be found that bandwidth is inversely proportional to NMSE and SKGR of CEA-CDI. This is because we add time-domain truncation in the CEA-CDI method, the LS method and HDF method do not have this step. In the simulation of 10M bandwidth, we set the delay path to 8 consecutive points (the channel length is 8 in the EPD model). We keep the delay of the path unchanged (0.1 ms interval between each path), so there will be 16 intermittent points under 20M bandwidth, which means our time-domain truncation step cannot remove extra noise. It can be observed an increase in bandwidth and a decrease in performance.

thumbnail Figure 11.

The impact of the channel: (a) NMSE; (b) SKGR

Finally, Figure 11 shows the impact of different channel conditions. For the proposed CEA-CDI algorithm, the SKGR performance is improved by about 19 dB compared to the initial LS estimation. Moreover, under the same SNR conditions, the SKGR improvement is up to 43.25 bits. It is noted that the delay path length of the TDL-A model is L = 25 and that of the EPD model is L = 7, which means that the delay path of the TDL-A model is more complex than that of the EPD model. We find that as the SNR increases, the performance of the CEA-CDI algorithm under the TDL-A model is consistently worse than that under the EPD model in the NMSE simulation, which is due to the increase of L increasing the difficulty of channel estimation.

Furthermore, it is noted that L has different effects on NMSE and SKGR. An increase in L may lead to an increase or decrease in SKGR, but it has little effect on NMSE. The reason for the above is that the SKGR is influenced by both the number of delay paths L and the SNR in the environment. A larger L and a higher SNR respectively mean a larger number of random sources and a more accurate estimation of random sources. Therefore, in a high SNR environment, an increase in L can lead to an improvement in SKGR. On the contrary, in low SNR environments, it is difficult to accurately estimate each random source, resulting in a decrease in SKGR as L increases.

Based on the simulation results and the complexity analysis in Section 4, it can be seen that although the CEA-CDI can effectively improve the SKGR compared with the initial channel estimation result (LS), it still has the following limitations: (1) As shown in Figure 8, the higher the number of symbols the higher SKGR can be improved by CEA-CDI. This may mean that the CEA-CDI is not applicable to low-rate communication scenarios, such as IoT. Because the low communication rate means that the number of symbols sent at one time will not be much, the performance improvement brought by the CEA-CDI is limited. (2) As shown in Section 4, the computational complexity of the CEA-CDI has increased, which may pose challenges for less capable terminals. (3) Since CEA-CDI requires iterative processing, it may cause latency overhead. However, we believe that this impact is relatively small. Unlike communication, key generation requires less real-time performance. Because the channel detection step can be asynchronous with the consistency enhancement step as shown in Figure 3. After obtaining the initial channel estimation in a coherent time, it can be processed slowly.

6. Conclusion

We start by solving the problem of low SKGR caused by channel inconsistency in the WC-SCK scheme and find that the current scheme did not fully utilize the received signal power. To address this issue, we employ the EM algorithm to derive and propose CEA-CDI. By making soft decisions on the received data symbols, the influence of the channel is preserved for each symbol. This iterative approach improves channel estimation accuracy, resulting in improved key consistency between legitimate communication users. The simulation results demonstrate that compared to the initial channel estimation, the proposed algorithm enhances performance by approximately 16dB, effectively improving SKGR.

Conflict of Interest

The authors declare no conflict of interest.

Data Availability

No data are associated with this article.

Authors’ Contributions

Liang Jin proposed the idea of using pilot and data to improve channel reciprocity and guided the overall work of this paper. Zheyuan Deng designed the algorithm, carried out experiments, produced the results and wrote the paper. Xiaoyan Hu researched the related work and revised the manuscript. Zhou Zhong, Yangming Lou, and Ge Niu discussed the effectiveness of the method and corrected the typos.

Acknowledgments

We thank the anonymous reviewers for their helpful comments.

Funding

This work was supported by the National Natural Science Foundation of China (No.U22A2001), and by the National Key Research and Development Program under Grants 2022YFB2902202.

References

  1. Peng L, Li G and Zhang J et al. An investigation of using loop-back mechanism for channel reciprocity enhancement in secret key generation. IEEE Trans on Mobile Comput 2019; 18: 507–519 [CrossRef] [Google Scholar]
  2. Zhang J, Marshall A and Woods R et al. Secure Key Generation From OFDM Subcarriers’ Channel Responses. In: IEEE Globecom Workshops (GC Wkshps), Austin, TX, USA, IEEE, 2014: 1302–7 [Google Scholar]
  3. Ambekar A, Hassan M and Schotten HD. Improving Channel Reciprocity for Effective key Management Systems. In: International Symposium on Signals Systems and Electronics (ISSSE), Potsdam, Germany, IEEE 2012: 1–4. [Google Scholar]
  4. Li G, Hu A and Zhang J et al. High-agreement uncorrelated secret key generation based on principal component analysis preprocessing. IEEE Trans Commun 2018; 66: 3022–34. [CrossRef] [Google Scholar]
  5. Wang X, Jin L and Lou Y et al. Analysis and application of endogenous wireless security principle for key generation. China Commun 2021; 18: 99–114. [CrossRef] [Google Scholar]
  6. 3GPP. TS 36.212. Evolved universal terrestrial radio access (E-UTRA); Multiplexing and channel coding (Release 14). 2017. [Google Scholar]
  7. Ma X, Kobayashi H and Schwartz SC. EM-Based channel estimation algorithms for OFDM EURASIP. J Adv Signal Process 2004; 10: 106272. [CrossRef] [Google Scholar]
  8. Cormen TH. Introduction to Algorithms 3rd ed. Cambridge Mass, MIT Press, 2009. [Google Scholar]
  9. Yuan H and Kam P-Y. Soft-decision-aided channel estimation over the flat-fading channel and an application to iterative decoding using an example LTE turbo code. IEEE Trans Wireless Commun 2014; 13: 6027–40 [CrossRef] [Google Scholar]
  10. Guo D, Cao K and Xiong J et al. A Lightweight Key Generation Scheme for the Internet of Things. IEEE Internet Things J 2021; 8: 12137–49 [CrossRef] [Google Scholar]
  11. Soni A, Upadhyay R and Kumar A. Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging. Phys Commun 2019; 33: 249–58 [CrossRef] [Google Scholar]
  12. Gan Y, Lei X and Xiao Y et al. Improved channel information extraction toward efficient secret key generation. In: IEEE 19th International Conference on Communication Technology (ICCT), Xi’an China, IEEE 2019: 97–101. [Google Scholar]
Zheyuan Deng

Zheyuan Deng received the M.S. degree from the PLA Strategic Support Force Information Engineering University, China, in 2022. And he is currently pursuing the Ph.D. degree at the PLA Strategic Support Force Information Engineering University. His research interests include wireless communication and physical layer security.

Liang Jin

Liang Jin received a Ph.D. degree from Xi’an Jiaotong University. He is currently a Professor and Ph.D. Supervisor of the PLA Strategic Support Force Information Engineering University, Zhengzhou, China. His research interests include wireless communication, physical layer security, and smart antennae.

Xiaoyan Hu

Xiaoyan Hu received an M.S. degree and Ph.D. degree in information and communication engineering from PLA Strategic Support Force Information Engineering University. He is currently an assistant researcher at PLA Strategic Support Force Information Engineering University. His research interests include physical layer security and information security.

Zhou Zhong

Zhou Zhong received an M.S. degree and Ph.D. degree in information and communication engineering from PLA Strategic Support Force Information Engineering University. He is currently an associate professor at PLA Strategic Support Force Information Engineering University. His research interests include physical layer security and wireless communication.

Yangming Lou

Yangming Lou received an M.S. degree in information and communication engineering from PLA Strategic Support Force Information Engineering University. He is currently an assistant researcher at PLA Strategic Support Force Information Engineering University. His research interests include physical layer security and wireless communication.

Ge Niu

Ge Niu received an M.S. degree in information and communication engineering from Zhengzhou University. He is currently an assistant engineer at PLA Strategic Support Force Information Engineering University. His research interests include physical layer security and information security.

All Tables

Table 2.

Comparison of the computational complexity

Table 3.

Simulation Parameters

All Figures

thumbnail Figure 1.

Communication process between Alice and Bob

In the text
thumbnail Figure 2.

Basic transmitting and receiving process of the OFDM system

In the text
thumbnail Figure 3.

WC-SKG scheme

In the text
thumbnail Figure 4.

The process results of consistency enhancement: (a) True channel (without noise); (b) Initial channel estimation (Eb/N0 = 5 dB); (c) CEA-CDI enhanced channel (Eb/N0 = 5 dB)

In the text
thumbnail Figure 5.

CEA-CDI process

In the text
thumbnail Figure 6.

The impact of CEA-CDI: (a) NMSE; (b) SKGR

In the text
thumbnail Figure 7.

The impact of different methods on KIR

In the text
thumbnail Figure 8.

The impact of the number of data symbols: (a) NMSE; (b) SKGR

In the text
thumbnail Figure 9.

The impact of the number of subcarriers: (a) NMSE; (b) SKGR

In the text
thumbnail Figure 10.

The impact of bandwidth: (a) NMSE; (b) SKGR

In the text
thumbnail Figure 11.

The impact of the channel: (a) NMSE; (b) SKGR

In the text

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.