Secret Key Generation From Mobility

被引:0
|
作者
Gungor, Onur [1 ]
Chen, Fangzhou [1 ]
Koksal, C. Emre [1 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
关键词
WIDE-BAND LOCALIZATION; FUNDAMENTAL LIMITS; INFORMATION; AGREEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.
引用
收藏
页码:874 / 878
页数:5
相关论文
共 50 条
  • [41] Common randomness and secret key generation with a helper
    Csiszár, I
    Narayan, P
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) : 344 - 366
  • [42] Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels
    Wang, Qian
    Xu, Kaihe
    Ren, Kui
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (09) : 1666 - 1674
  • [43] Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness
    Liu, Yanpei
    Draper, Stark C.
    Sayeed, Akbar M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) : 1484 - 1497
  • [44] Secret Key Generation From Vector Gaussian Sources With Public and Private Communications
    Xu, Yinfei
    Cao, Daming
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1101 - 1105
  • [45] The Optimal Preprocessing Approach for Secret Key Generation from OFDM Channel Measurements
    Li, Guyue
    Hu, Aiqun
    Peng, Linning
    Sun, Chen
    2016 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2016,
  • [46] Secret Key Generation From Vector Gaussian Sources With Public and Private Communications
    Xu, Yinfei
    Cao, Daming
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (08) : 5420 - 5431
  • [47] Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks
    Diamant, Roee
    Tomasin, Stefano
    Ardizzon, Francesco
    Eccher, Davide
    Casari, Paolo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3318 - 3333
  • [48] Adaptive Secret Key Generation in Underwater Acoustic System
    Murthy, T. S. N.
    Reddyka, G. Satish
    Padmaraju, K.
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 698 - 702
  • [49] Secret Key Generation and Agreement in UWB Communication Channels
    Madiseh, Masoud Ghoreishi
    McGuire, Michael L.
    Neville, Stephen S.
    Cai, Lin
    Horie, Michael
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [50] Random Bit Extraction for Secret Key Generation in MANETs
    K. R. Shibu
    R. Suji Pramila
    Wireless Personal Communications, 2019, 107 : 2247 - 2261