Stealthy Secret Key Generation

被引:3
|
作者
Lin, Pin-Hsun [1 ]
Janda, Carsten R. [1 ]
Jorswieck, Eduard A. [1 ]
Schaefer, Rafael F. [2 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Informat Theory & Commun Syst Dept, D-38106 Braunschweig, Germany
[2] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
secret key generation; source model; stealthy communications; covert communications; channel resolvability; conceptual wiretap channel; stochastically degraded; stochastic orders; COMMUNICATION; AGREEMENT;
D O I
10.3390/e22060679
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie's attention since it has a public discussion, which is observable by Willie. To prevent Willie's attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Bipartite Graph Matching Based Secret Key Generation
    Liu, Hongbo
    Wang, Yan
    Ren, Yanzhi
    Chen, Yingying
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [42] Secret Key Generation for Minimally Connected Hypergraphical Sources
    Zhou, Qiaoqiao
    Chan, Chung
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (07) : 4226 - 4244
  • [43] Optimal Pilots for Maximal Capacity of Secret Key Generation
    Zhu, Qiping
    Hua, Yingbo
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [44] Performance of secret key generation in non stationary channels
    Mazloum, Taghrid
    Sibille, Alain
    2015 9TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP), 2015,
  • [45] Random Bit Extraction for Secret Key Generation in MANETs
    Shibu, K. R.
    Pramila, R. Suji
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (04) : 2247 - 2261
  • [46] Secret upgrades target stealthy cruise missiles
    Fulghum, DA
    AVIATION WEEK & SPACE TECHNOLOGY, 1998, 149 (08): : 22 - 23
  • [47] New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation
    Adil, Muhammad
    Ullah Khan, Habib
    Arif, Mohammad
    Shah Nawaz, Mian
    Khan, Faheem
    IEEE ACCESS, 2024, 12 : 82972 - 82983
  • [48] A Data-Driven Analysis of Secret Key Rate for Physical Layer Secret Key Generation From Wireless Channels
    Matsumine, Toshiki
    Ochiai, Hideki
    Shikata, Junji
    IEEE COMMUNICATIONS LETTERS, 2023, 27 (12) : 3166 - 3170
  • [49] Generation of the Secret Encryption Key Using the Signature of the Embedded System
    Venckauskas, Algimantas
    Jusas, Nerijus
    Mikuckiene, Irena
    Maciulevicius, Stasys
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (04): : 368 - 375
  • [50] Physical-Layer Secret Key Generation with Untrusted Relays
    Chan Dai Truyen Thai
    Lee, Jemin
    Cheng, Chi
    Quek, Tony Q. S.
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1385 - 1390