Secret Key Generation From Mobility

被引:0
|
作者
Gungor, Onur [1 ]
Chen, Fangzhou [1 ]
Koksal, C. Emre [1 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
关键词
WIDE-BAND LOCALIZATION; FUNDAMENTAL LIMITS; INFORMATION; AGREEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.
引用
收藏
页码:874 / 878
页数:5
相关论文
共 50 条
  • [21] Secret key generation scheme from WiFi and LTE reference signals
    Christiane L. Kameni Ngassa
    Renaud Molière
    François Delaveau
    Alain Sibille
    Nir Shapira
    Analog Integrated Circuits and Signal Processing, 2017, 91 : 277 - 292
  • [22] Secret key generation scheme from WiFi and LTE reference signals
    Ngassa, Christiane L. Kameni
    Moliere, Renaud
    Delaveau, Francois
    Sibille, Alain
    Shapira, Nir
    ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2017, 91 (02) : 277 - 292
  • [23] Secret-key generation from wireless channels: Mind the reflections
    Vogt, Hendrik
    Sezgin, Aydin
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 783 - 788
  • [24] Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels
    Jorswieck, Eduard A.
    Wolf, Anne
    Engelmann, Sabrina
    2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2013, : 1245 - 1250
  • [25] Secret key generation from classical physics - Physical uncloneable functions
    Tuyls, Pim
    Skoric, Boris
    AMIWARE: HARDWARE TECHNOLOGY DRIVERS OF AMBIENT INTELLIGENCE, 2006, 5 : 421 - +
  • [26] Eliminating Privacy Amplification in Secret Key Generation from Wireless Channels
    Cao, Zhongqiang
    Wu, Xiaofu
    Zhu, Wei-ping
    Cui, Jingwu
    PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 266 - 271
  • [27] Secret key generation from Gaussian sources using lattice hashing
    Ling, Cong
    Luzzi, Laura
    Bloch, Matthieu R.
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 2621 - +
  • [28] Protecting Physical Layer Secret Key Generation from Active Attacks
    Mitev, Miroslav
    Chorti, Arsenia
    Belmega, E. Veronica
    Poor, H. Vincent
    ENTROPY, 2021, 23 (08)
  • [29] Key Generation for Multi-Secret Steganography
    Koptyra, Katarzyna
    Ogiela, Marek R.
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 1 - 4
  • [30] Secret Key Generation Using OFDM Samples
    Kakkar, Shantnu
    Makkar, Inderpreet Singh
    Mohapatra, A. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (04): : 439 - 454