Skema Peningkatan Reciprocity Kanal dengan Menggunakan Metode Hierarchical Clustering

Prima Kristalina, Florista Dewi, Mike Yuliana, Tri Budi Santoso, Amang Sudarsono, Reni Soelistijorini


Secret key generation scheme that utilizes the randomness of wireless channels is a very promising alternative to establish a secure communication path. Some wireless devices are used to obtain the channel parameters. But the problem that occurs is imprecise measurement results, causing a secret key difference between the two users. To overcome this problem, pre-processing method is used before the data is quantized, to increase the similarity (reciprocity) channel parameter measurement results. In this paper, the effect of the use of one pre-process method, which was hierarchical clustering, on the performance of secret key generation scheme in an indoor environment with two variations of scenario was investigated. The results show that the use of the pre-processing method can improve the similarity parameter of the channel measurement results as indicated by the increasing of correlation values up to 20%. In addition, the resulting bit mismatch also decreases with the value of key disagreement rate (KDR) maximum of 20%.


secret key, praproses, reciprocity, hierarchical clustering, KDR

Full Text:



W. Stallings, Cryptography and Network Security: Principles and Practice, 6th ed. Upper Saddle River, NJ, USA: Prentice Hall, 2013.

A. Karima, L.B. Handoko, dan A. Saputro, “Pemfaktoran Bilangan Prima pada Algoritma ElGamal untuk Keamanan Dokumen PDF,” Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI), Vol. 6, No.3, hal. 252-258, Agustus 2017.

A. Mukherjee, S. Fakoorian, J. Huang, dan A. Swindlehurst, “Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey,” IEEE Commun. Surveys Tuts., Vol. 16, No. 3, hal. 1550–1573, 2014.

S. N. Premnath, S. Jana, J. Croft, P. L. Gowda, M. Clark, S. K. Kasera, N. Patwari, dan S. V. Krishnamurthy, “Secret Key Extraction from Wireless Signal Strength in Real Environments,” IEEE Trans. Mobile Comput., Vol. 12, No. 5, hal. 917–930, 2013.

S. Ali, V. Sivaraman, dan D. Ostry, “Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices,” IEEE Trans. Mobile Comput., Vol. 13, No. 12, hal. 2763–2776, 2014.

B. Zan, M. Gruteser, dan F. Hu, “Key Agreement Algorithms for Vehicular Communication Networks Based on Reciprocity and Diversity Theorems,” IEEE Trans. Veh. Technol., Vol. 62, No. 8, hal. 4020–4027, 2013.

M. Yuliana, Wirawan, dan Suwadi “Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment,” IJCNIS, Vol. 9, No. 3, hal. 474–483, 2017.

J. Zhang, R. Woods, T.Q.Duong, A. Marshall, dan Y. Ding, “Experimental Study on Channel Reciprocity in Wireless Key Generation”, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2016, hal. 1-5.

L. Shi, J. Yuan, S. Yu, dan M. Li, “ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks,” Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC’13, 2013, hal. 155–166.

M. Edman, A. Kiayias, Q. Tang, dan B. Yener. “On the Security of Key Extraction from Measuring Physical Quantities,” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 8, hal. 1796-1806, Agustus 2016.

A. Badawy, T. Khattab, T. Elfouly, A. Mohamed, D. Trinchero, “Secret Key Generation Based on Channel and Distance Measurements,” 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT, 2014, hal. 136–142.

J. Zhang, T. Q. Duong, A. Marshall, dan R. Woods, “Key Generation from Wireless Channels: A Review,” IEEE Access, Vol. 4, hal. 614–626, 2016.

M. Yuliana, Wirawan, dan Suwadi, “Performance Evaluation of the Key Extraction Schemes in Wireless Indoor Environment,” Proceedings - International Conference on Signals and Systems, ICSigSys 2017, 2017, hal. 138-144.

C. Ye, S. Mathur, A. Reznik, Y. Shah,W. Trappe, dan N. B. Mandayam, “Information-Theoretically Secret Key Generation for Fading Wireless Channels,” IEEE Trans. Inf. Forensics Security, Vol. 5, No. 2, hal. 240– 254, 2010.



  • There are currently no refbacks.

Copyright (c) 2018 Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI)



Tim Redaksi JNTETI

Jurusan Teknik Elektro dan Teknologi Informasi
Fakultas Teknik Universitas Gadjah Mada
Jl. Grafika No. 2 Kampus UGM Yogyakarta

Telp. +62 0274 552305

Email :



 JNTETI Visitor :

Flag Counter

JNTETI Visitor


 Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.