Secret Key Generation From Mobility

被引:0
|
作者
Gungor, Onur [1 ]
Chen, Fangzhou [1 ]
Koksal, C. Emre [1 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
关键词
WIDE-BAND LOCALIZATION; FUNDAMENTAL LIMITS; INFORMATION; AGREEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.
引用
收藏
页码:874 / 878
页数:5
相关论文
共 50 条
  • [1] Secret Key Generation Via Localization and Mobility
    Gungor, Onur
    Chen, Fangzhou
    Koksal, Can Emre
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (06) : 2214 - 2230
  • [2] MobiKey: Mobility-Based Secret Key Generation in Smart Home
    Wang, Lin
    An, Haonan
    Zhu, Haojin
    Liu, Wenyuan
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) : 7590 - 7600
  • [3] Mobility Assisted Secret Key Generation Using Wireless Link Signatures
    Zhang, Junxing
    Kasera, Sneha K.
    Patwari, Neal
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [4] On Secret Key Generation From Finite Source Observations
    Tu, Wenwen
    Lai, Lifeng
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [5] Covert Secret Key Generation
    Tahmasbi, Mehrdad
    Bloch, Matthieu R.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 540 - 544
  • [6] Stealthy Secret Key Generation
    Lin, Pin-Hsun
    Janda, Carsten R.
    Jorswieck, Eduard A.
    Schaefer, Rafael F.
    ENTROPY, 2020, 22 (06)
  • [7] Stealthy Secret Key Generation
    Lin, Pin-Hsun
    Janda, Carsten Rudolf
    Jorswieck, Eduard Axel
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 492 - 496
  • [8] Secret Key Generation from Static Channels with Untrusted Relays
    Guillaume, Rene
    Ludwig, Stephan
    Mueller, Andreas
    Czylwik, Andreas
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 635 - 642
  • [9] Secret Key Generation from a Biometric Source with an Eavesdropping Jammer
    Baur, Sebastian
    Boche, Holger
    Cai, Ning
    INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019, 2019, 2019-January
  • [10] Secret Key Generation from Correlated Sources and Secure Link
    Cao, Daming
    Kang, Wei
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,