Performance of secret key generation in non stationary channels

被引:0
|
作者
Mazloum, Taghrid [1 ]
Sibille, Alain [1 ]
机构
[1] Telecom ParisTech LTCI, Commun & Elect Dept, Paris, France
来源
2015 9TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP) | 2015年
关键词
physical layer; information security; propagation; spatial diversity; MODEL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secret key generation from the randomness provided by random channels is currently considered as one way to improve security in wireless communications at the physical layer level. However, the relation between the performance of SKG schemes and the characteristics of the radio channel has been moderately investigated. In this work, we evaluate the security performance through a simple channel model based on scatterers distributed around the terminals, which enables going beyond the common assumption of spatial stationarity between the legitimate terminal and the eavesdropper. This performance is assessed both from information theory metrics and from a practical key extraction algorithm.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secret Key Generation and Agreement in UWB Communication Channels
    Madiseh, Masoud Ghoreishi
    McGuire, Michael L.
    Neville, Stephen S.
    Cai, Lin
    Horie, Michael
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [2] Filterbank Secret Key Generation Rates in Multipath Channels
    Mitev, Miroslav
    Barreto, Andre N.
    Pham, Thuy M.
    Matthe, Maximilian
    Fettweis, Gerhard
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4057 - 4062
  • [3] Secret Key Generation via Random Beamforming in Stationary Environment
    Cheng, Longwang
    Li, Wei
    Ma, Dongtang
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,
  • [4] Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation
    Qin, Dongrun
    Ding, Zhi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2693 - 2705
  • [5] Secret Key Generation from Static Channels with Untrusted Relays
    Guillaume, Rene
    Ludwig, Stephan
    Mueller, Andreas
    Czylwik, Andreas
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 635 - 642
  • [6] Experimental Study of Secret Key Generation in Underwater Acoustic Channels
    Huang, Yi
    Zhou, Shengli
    Shi, Zhijie
    Lai, Lifeng
    CONFERENCE RECORD OF THE 2014 FORTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, 2014, : 323 - 327
  • [7] Group Secret Key Generation over Broadcast Erasure Channels
    Siavoshani, Mahdi Jafari
    Fragouli, Christina
    Diggavi, Suhas
    Pulleti, Uday
    Argyraki, Katerina
    2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 719 - 723
  • [8] Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels
    Lu, Youjing
    Wu, Fan
    Huang, Qianyi
    Tang, Shaojie
    Kong, Linghe
    Chen, Guihai
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (01)
  • [9] Secret-Key Generation Using Correlated Sources and Channels
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) : 652 - 670
  • [10] Interactive Secret Key Generation over Reciprocal Fading Channels
    Khisti, Ashish
    2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 1374 - 1381