The Error Analysis of the Secret Key Generation Algorithm Using Analog Function Computation

Ertugrul Alper,Eray Guven,Gunes Karabulut Kurt,Enver Ozdemir
2024-07-15
Abstract:This study introduces a decentralized approach to secure wireless communication using a cryptographic secret key generation algorithm among distributed nodes. The system model employs Gaussian prime numbers, ensuring the collaborative generation of a secret key. Pre-processing and post-processing functions enable to generate a secret key across the network. An error model evaluates aspects like thermal noise power and channel estimation errors, while simulations assess the success rate to factorize the norm of the secret key. It is observed that path loss-induced large scale fading emerges as a critical component impacting information and power loss. The robustness of the proposed model under fading channel conditions is evaluated with a success rate. Additionally, it is also observed that the tolerance value set in the factorization algorithms has a significant impact on the success rate. Furthermore, the success rate is compared in two scenarios, one with 2 users and another with 3 users, to provide a comprehensive evaluation of the system performance.
Cryptography and Security,Information Theory
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to ensure secure communication between nodes in a distributed wireless network through a decentralized key generation algorithm. Specifically, the paper aims to: 1. **Design a decentralized key generation algorithm**: Different from traditional centralized networks, this algorithm enables all legitimate nodes to cooperate in generating and sharing a secret key without relying on a central base station to store the key. 2. **Evaluate the error model of the key generation algorithm**: Research the influence of factors such as thermal noise power and channel estimation error on key generation in the actual communication environment, and propose an error model to evaluate the influence of these factors on the success rate of key generation. 3. **Analyze the influence of large - scale and small - scale fading channels**: Explore the influence of large - scale fading caused by path loss on information and power loss, and the influence of the Rician factor \( K \) on the performance of the key generation algorithm. 4. **Optimize system performance**: Through Monte Carlo simulation, evaluate the success rate of key generation under different conditions, and explore how to select the optimal tolerance value to improve the robustness and reliability of the system. ### Specific problems - **Influence of thermal noise power**: Thermal noise will introduce additional interference, causing the generated secret key value to be different from the theoretical value. - **Channel estimation error**: Inaccurate channel estimation will lead to errors in the transmission process and affect the success rate of key generation. - **Rician factor \( K \)**: Different \( K \) values will affect the channel characteristics and then affect the performance of key generation. - **Influence of the distance between nodes**: As the distance between nodes increases, signal attenuation intensifies, affecting the success rate of key generation. ### Solutions - **Decentralized key generation algorithm**: Use Gaussian primes to generate secret keys and propagate and calculate in the network through pre - processing and post - processing functions. - **Error model**: Establish an error model, considering factors such as thermal noise and channel estimation error, to evaluate the success rate of key generation. - **Simulation evaluation**: Through Monte Carlo simulation, test the success rate of key generation under different conditions, and optimize system parameters (such as tolerance values) to improve performance. ### Formula examples 1. **Pre - processing function**: \[ \phi_i(x_i)=\frac{1}{h_{ij}}\ln(x_i) \] where \( x_i\in\mathbb{C} \), and \( h_{ij} \) is the channel impulse response (CIR) between the \( i \) - th transmitting node and the \( j \) - th receiving node. 2. **Post - processing function**: \[ \psi_j(y_j)=e^{y_j} \] where \( y_j\in\mathbb{C} \), and \( y_j \) is the received signal. 3. **Channel estimation error**: \[ \tilde{h}_{ij}=\frac{h_{ij}^e}{h_{ij}}, \quad \forall i\neq j \] where \( h_{ij}^e \) is the estimated CIR, and \( h_{ij} \) is the real CIR. 4. **Path loss equation**: \[ \frac{P_r}{P_t}=G_tG_r\left(\frac{\lambda}{4\pi d_{ij}}\right)^2 \] where \( P_t \) and \( P_r \) are the transmitting and receiving signal powers respectively, \( d_{ij} = |\rho_i - \rho_j| \) is the distance between node \( i \) and node \( j \), and \( \lambda \) is the wavelength of the modulated carrier signal. Through these methods, the paper aims to provide an effective solution for secure communication in distributed wireless networks and verify its feasibility through detailed mathematical formulas and simulations.