Secret Key Group Implementation Using Chain Topology

Mike Yuliana, Amang Sudarsono
{"title":"Secret Key Group Implementation Using Chain Topology","authors":"Mike Yuliana, Amang Sudarsono","doi":"10.1109/NICS54270.2021.9701561","DOIUrl":null,"url":null,"abstract":"The rapid development of technology is marked by the increasing use of wi-fi technology for the process of exchanging data and information. Over time, the exchange of data and information began to become insecure. Therefore, a secret key is needed. This key is needed to maintain the security and comfort of wi-fi users in exchanging data or information that is confidential and does not want other users to know. In this study, it is proposed to create a secret key group using a chain topology and received signal strength (RSS) as a source of key extraction. The advantage of secret key extraction using Received Signal Strength (RSS) is that it is easy to access to be applied to wireless devices. From the overall test results, it can be seen that scenario 1 produces the best performance in terms of correlation parameters and the number of secret keys generated. The highest correlation obtained reached 0.9064 while the number of keys obtained reached 7 keys with an approximate entropy of 0.528.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NICS54270.2021.9701561","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid development of technology is marked by the increasing use of wi-fi technology for the process of exchanging data and information. Over time, the exchange of data and information began to become insecure. Therefore, a secret key is needed. This key is needed to maintain the security and comfort of wi-fi users in exchanging data or information that is confidential and does not want other users to know. In this study, it is proposed to create a secret key group using a chain topology and received signal strength (RSS) as a source of key extraction. The advantage of secret key extraction using Received Signal Strength (RSS) is that it is easy to access to be applied to wireless devices. From the overall test results, it can be seen that scenario 1 produces the best performance in terms of correlation parameters and the number of secret keys generated. The highest correlation obtained reached 0.9064 while the number of keys obtained reached 7 keys with an approximate entropy of 0.528.
使用链拓扑实现秘密密钥组
技术的快速发展标志着越来越多地使用wi-fi技术来交换数据和信息。随着时间的推移,数据和信息的交换开始变得不安全。因此,需要一个密钥。该密钥用于维护wi-fi用户在交换机密数据或信息时的安全性和舒适性,并且不希望其他用户知道。在本研究中,提出使用链拓扑和接收信号强度(RSS)作为密钥提取源来创建秘密密钥组。使用接收信号强度(RSS)提取密钥的优点是易于访问并应用于无线设备。从整体测试结果可以看出,就相关参数和生成的密钥数量而言,场景1产生了最好的性能。获得的最高相关性达到0.9064,获得的键数达到7个键,近似熵为0.528。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信