Li, G., Hu, A., Zhang, J., Peng, L., Sun, C., & Cao, D. (2018). High-agreement uncorrelated secret key generation based on principal component analysis preprocessing. IEEE Transactions on Communications, 66(7), 3022–3034. https://doi.org/10.1109/TCOMM.2018.2814607

Srivastva, R., & Singh, Y. N. (2019). ECG analysis for human recognition using non-fiducial methods. IET Biometrics, 8(5), 295–305. https://doi.org/10.1049/iet-bmt.2018.5093

Bottarelli, M., Karadimas, P., Epiphaniou, G., Ismail, D. K. B., & Maple, C. (2021). Adaptive and optimum secret key establishment for secure vehicular communications. IEEE Transactions on Vehicular Technology, 70(3), 2310–2321. https://doi.org/10.1109/TVT.2021.3056638

Soni, A., Upadhyay, R., & Kumar, A. (2019). Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging. Physical Communication, 33, 249–258.

Patwari, N., Croft, J., Jana, S., & Kasera, S. K. (2010). High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing, 9(1), 17–30. https://doi.org/10.1109/TMC.2009.88

Zhang, J., Duong, T. Q., Marshall, A., & Woods, R. (2016). Key generation from wireless channels: A review. IEEE Access, 4, 614–626. https://doi.org/10.1109/ACCESS.2016.2521718

Epiduralkey

Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T., & Thomas, P. (2017). Physical layer secret-key generation with discreet cosine transform for the Internet of Things. In 2017 IEEE International Conference on Communications (ICC), Paris (pp. 1–)6. https://doi.org/10.1109/ICC.2017.7997419

Bakşi, S., & Popescu, D. C. (2019). Secret key generation with precoding and role reversal in MIMO wireless systems. IEEE Transactions on Wireless Communications, 18(6), 3104–3112. https://doi.org/10.1109/TWC.2019.2910103

Achieving communication security, along with high computational efficiency, is one of the challenging issues in the advancement of modern resource constraint wireless networks. Wireless physical layer secure key extraction in conjunction with suitable preprocessing techniques may be a possible way out. Principal component analysis (PCA) is one of the dimensionality reduction techniques employed commonly in various domains for different applications. However, the physical layer secure key extraction employing PCA as dimensionality reduction is untouched so far. This paper presents a comprehensive study on PCA based wireless secret key extraction with real-time experimentation. In this work, we propose to apply PCA as a preprocessing technique to reduce the total number of numerical computations required in the key generation process, by cutting down the dimension of the input data set. We propose to select the extracted principal components to be processed further for key generation, based on their information content and cross-correlation. We analyzed the performance of the proposed in terms of bit disagreement rate, key randomness and pass ratio. The computational complexity of the proposed approach is derived and the effect of dimensionality reduction factor (\({\mathbf{R}}_{\mathbf{f}}\)) on the required numerical computations is analyzed. It is found that substantial improvement in bit disagreement performance is achieved along with a significant reduction in the required numerical computations. Remarkably, these outcomes are achieved by slightly modifying one of the blocks of the traditional key generation system. Furthermore, the practicability of the proposed technique is verified through real-time experimentation in different physical scenarios.

Lin, R., Xu, L., Fang, H., et al. (2020). Efficient physical layer key generation technique in wireless communications. Journal of Wireless Communication Network, 2020, 13. https://doi.org/10.1186/s13638-019-1634-7

Room No D106, D-Block, Department of Electronics & Telecommunication, Institute of Engineering & Technology (IET-DAVV), Devi Ahilya Vishwavidyalaya, Khandwa Road, Indore, 452012, India

Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., & Vo, S. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology, Tech. Rep. Special Publication 800-22 Revision 1a.

Hu, L., Zhang, F., Hu, A., Jiang, Y., & Li, G. (2018). A key generation scheme for wireless physical layer based on frequency hopping. In 8th International Congress of Information and Communication Technology (ICICT-2018) (Vol. 131, pp. 1104–1112).

Jia, W., Sun, M., Lian, J., et al. (2022). Feature dimensionality reduction: A review. Complex Intell. Syst. https://doi.org/10.1007/s40747-021-00637-x

Park, K.-M., Hyun, S.-H., Lee, S., & Kim, S.-C. (2021). Fine-resolution ranging scheme based on signal strength in indoor hallway with rough-surface slab waveguide. IEEE Transactions on Instrumentation and Measurement, 70, 1–10. https://doi.org/10.1109/TIM.2021.3073324

Lou, C., Cao, M., Wu, R., Chen, D., & Xu, H. (2021). A lightweight key generation scheme for secure device-to-device (D2D) communication. Wireless Communications and Mobile Computing. https://doi.org/10.1155/2021/6642605

CADDKey

Room No D108, D-Block, Department of Electronics & Telecommunication, Institute of Engineering & Technology (IET-DAVV), Devi Ahilya Vishwavidyalaya India, Khandwa Road, Indore, 452012, India

This research work was supported under the Visvesvaraya Ph.D. Scheme for Electronics and IT by the Ministry of Electronics and Information Technology (MeitY), Government of India, sanctioned to Devi Ahilya Vishwavidyalaya under grant number PhD-MLA-4(37)/2015–16, Dated 11–09-2015. Ankit Soni has received research support from Ministry of Electronics and Information Technology (MeitY), Government of India to carry out this work.

Wang, L., An, H., Zhu, H., & Liu, W. (2020). MobiKey: Mobility-based secret key generation in smart home. IEEE Internet of Things Journal, 7(8), 7590–7600. https://doi.org/10.1109/JIOT.2020.2986399

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Ankit Soni. The first draft of the manuscript was written by Ankit Soni and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Alkandari, A. A., Al-Shaikhli, I. F., & Alahmad, M. A. (2013). Cryptographic hash function: A high level view. International Conference on Informatics and Creative Multimedia, 2013, 128–134. https://doi.org/10.1109/ICICM.2013.29

Gupta, V., & De, S. (2018). SBL-based adaptive sensing framework for WSN-assisted IoT applications. IEEE Internet of Things Journal, 5(6), 4598–4612. https://doi.org/10.1109/JIOT.2018.2870970

Huth, C., Guillaume, R., Strohm, T., Duplys, P., Samuel, I. A., & Güneysu, T. (2016). Information reconciliation schemes in physical-layer security: A survey. Computer Networks, 109, 84–104. https://doi.org/10.1016/j.comnet.2016.06.014

Almohamad, T. A., Mohd Salleh, M. F., Mahmud, M. N., & Sa’D, A. H. Y. (2018). Simultaneous determination of modulation types and signal-to-noise ratios using feature-based approach. In IEEE Access (Vol. 6, pp. 9262–9271). https://doi.org/10.1109/ACCESS.2018.2809448

Mucchi, L., Nizzi, F., Pecorella, T., Fantacci, R., & Esposito, F. (2019). Benefits of physical layer security to cryptography: Tradeoff and applications. In 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia, 2019 (pp. 1–3). https://doi.org/10.1109/BlackSeaCom.2019.8812778

Soni, A., Upadhyay, R. & Kumar, A. Low Complexity Preprocessing Approach for Wireless Physical Layer Secret Key Extraction Based on PCA. Wireless Pers Commun 125, 2865–2888 (2022). https://doi.org/10.1007/s11277-022-09689-9

AlarisPCAPump

Fang, S., & Wang, C. (2015). A novel fused positioning feature for handling heterogeneous hardware problem. IEEE Transactions on Communications, 63(7), 2713–2723. https://doi.org/10.1109/TCOMM.2015.2442989

Salo, F., Nassif, A. B., & Essex, A. (2019). Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Computer Networks, 148, 164–175.

Liu, T. (2007). Analysis of the principal component combining with weight estimation for DPSK signals. IEEE Transactions on Wireless Communications, 6(3), 822–826. https://doi.org/10.1109/TWC.2007.05483

CADD-Solis PumpKey

Prasad, K. N. R. S. V., & Bhargava, V. K. (2021). RSS localization under gaussian distributed path loss exponent model. IEEE Wireless Communications Letters, 10(1), 111–115. https://doi.org/10.1109/LWC.2020.3021991

The author would like to acknowledge and thanks Ministry of Electronics and Information Technology (MeitY), Government of India for supporting this research work under the Visvesvaraya Ph.D. Scheme for Electronics and IT by the Ministry of Electronics and Information Technology, sanctioned to Devi Ahilya Vishwavidyalaya under grant number PhD-MLA-4(37)/2015-16, Dated 11-09-2015.

Lei, W., Yizhou, G., Fucai, Z., & Yong, W. (2018). The method to recognize linear block code based on the distribution of code weight. In 2018 10th International Conference on Communication Software and Networks (ICCSN) (pp. 16–20). https://doi.org/10.1109/ICCSN.2018.8488259.

CADDkeyeBay

Zhuang, J., Wang, Y., Zhang, S., Wan, P., & Sun, C. (2019). A multi-antenna spectrum sensing scheme based on main information extraction and genetic algorithm clustering. IEEE Access, 7, 119620–119630. https://doi.org/10.1109/ACCESS.2019.2936511

PCApump

Soni, A., Upadhyay, R., & Kumar, A. (2019). Dimensionality reduction in wireless physical layer key generation. Proceeding of IEEE INDICON. https://doi.org/10.1109/INDICON47234.2019.9029059

Padilla, J. L., Padilla, P., Valenzuela-Valdés, J. F., Ramírez, J., & Górriz, J. M. (2014). RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation. Measurement, 58, 468–475.

Zhan, F., & Yao, N. (2017). On the using of discrete wavelet transform for physical layer key generation. Ad Hoc Networks, 64, 22–31. https://doi.org/10.1016/j.adhoc.2017.06.003

The datasets generated and/or analyzed during the current study are available from the corresponding author on reasonable request.

Soni, A., Upadhyay, R., & Jain, A. Internet of things & Wireless Physical Layer security : A survey. https://doi.org/10.1007/978-981-10-3226-4_11

Graur, O., Islam, N., Henkel, W., & “Quantization for Physical Layer Security”,. (2016). IEEE Globecom Workshops (GC Wkshps). Washington, DC, 2016, 1–7. https://doi.org/10.1109/GLOCOMW.2016.7849013

Wang, D., Bai, B., Lei, K., Zhao, W., Yang, Y., & Han, Z. (2019). Enhancing information security via physical layer approaches in heterogeneous IoT With multiple access mobile edge computing in smart city. IEEE Access, 7, 54508–54521. https://doi.org/10.1109/ACCESS.2019.2913438

Adil, M., Wyne, S., & Nawaz, S. J. (2021). On quantization for secret key generation from wireless channel samples. IEEE Access, 9, 21653–21668. https://doi.org/10.1109/ACCESS.2021.3055561