Repurposing Physical Layer Secret Keys: A Novel Paradigm for Common Randomness Generation

Research output: Contribution to book/Conference proceedings/Anthology/ReportConference contributionContributedpeer-review

Abstract

Identification is a new paradigm introduced for goal-oriented communication that verifies the semantics of the intended message rather than just transmitting the message bits, which is traditionally done in classical communication systems. One of the key techniques to improve randomized identification capacity is by introducing Common Randomness (CR). Physical Layer Secret Key (PLSK) is one such CR generation technique, where terminals generate secret keys based on changes in channel reciprocity between the wireless terminals and are mainly used for PHY layer encryption. However, the traditional way of evaluating PLSK techniques through bit discrepancies, bit generation rate, and entropy is not sufficient for evaluating their usefulness for identification. This paper proposes three key novel information theory paradigms that can be used alongside other mentioned parameters to evaluate key PLSK techniques for their usefulness in identification, i.e., CR rate, CR capacity, and cost function, followed by a supporting implementation using Software Defined Radio (SDR)s.

Details

Original languageEnglish
Title of host publication2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages327-332
Number of pages6
ISBN (electronic)9798350382846
Publication statusPublished - 2024
Peer-reviewedYes

Publication series

SeriesIEEE International Symposium on Information Theory - Proceedings
ISSN2157-8095

Conference

Title2024 IEEE International Symposium on Information Theory
Abbreviated titleISIT 2024
Duration7 - 12 July 2024
Website
LocationInterContinental Athenaeum
CityAthens
CountryGreece

External IDs

ORCID /0000-0001-8469-9573/work/171550436

Keywords

Keywords

  • 5G/6G, Common Randomness, Physical Layer Security, Post-Shannon Communication, SDR, Signal Processing