{"title":"Secret Key Group Implementation Using Chain Topology","authors":"Mike Yuliana, Amang Sudarsono","doi":"10.1109/NICS54270.2021.9701561","DOIUrl":null,"url":null,"abstract":"The rapid development of technology is marked by the increasing use of wi-fi technology for the process of exchanging data and information. Over time, the exchange of data and information began to become insecure. Therefore, a secret key is needed. This key is needed to maintain the security and comfort of wi-fi users in exchanging data or information that is confidential and does not want other users to know. In this study, it is proposed to create a secret key group using a chain topology and received signal strength (RSS) as a source of key extraction. The advantage of secret key extraction using Received Signal Strength (RSS) is that it is easy to access to be applied to wireless devices. From the overall test results, it can be seen that scenario 1 produces the best performance in terms of correlation parameters and the number of secret keys generated. The highest correlation obtained reached 0.9064 while the number of keys obtained reached 7 keys with an approximate entropy of 0.528.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NICS54270.2021.9701561","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The rapid development of technology is marked by the increasing use of wi-fi technology for the process of exchanging data and information. Over time, the exchange of data and information began to become insecure. Therefore, a secret key is needed. This key is needed to maintain the security and comfort of wi-fi users in exchanging data or information that is confidential and does not want other users to know. In this study, it is proposed to create a secret key group using a chain topology and received signal strength (RSS) as a source of key extraction. The advantage of secret key extraction using Received Signal Strength (RSS) is that it is easy to access to be applied to wireless devices. From the overall test results, it can be seen that scenario 1 produces the best performance in terms of correlation parameters and the number of secret keys generated. The highest correlation obtained reached 0.9064 while the number of keys obtained reached 7 keys with an approximate entropy of 0.528.