Secret-key generation from wireless channels: Mind the reflections

被引:0
|
作者
Vogt, Hendrik [1 ]
Sezgin, Aydin [1 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC) | 2014年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We study the problem of secret-key generation in a wireless environment by exploiting the inherent randomness and reciprocity of the channel gain. A channel model is proposed which takes into account the effect of reflections (or re-radiations) from receive antenna elements, thus capturing a physical property of practical antennas. It turns out that the reflections have a deteriorating effect on the achievable secret-key rate at high signal-to-noise ratio (SNR). These insights provide guidelines in the design and operation of communication systems using the properties of the wireless channel to prevent eavesdropping.
引用
收藏
页码:783 / 788
页数:6
相关论文
共 50 条
  • [1] Secret-key generation with correlated sources and noisy channels
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 1005 - +
  • [2] Secret-Key Generation Using Correlated Sources and Channels
    Khisti, Ashish
    Diggavi, Suhas N.
    Wornell, Gregory W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) : 652 - 670
  • [3] A Remark on Secret-Key Generation over Correlated Fading Channels
    Khisti, Ashish
    Diggavi, Suhas N.
    2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 864 - 868
  • [4] On Secret-Key Generation Using Wideband Channels in Mobile Networks
    Shen, Yuan
    Win, Moe Z.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 4151 - 4156
  • [5] Enhanced secret-key generation from atmospheric optical channels with the use of random modulation
    Chen, Chunyi
    LI, Qiong
    OPTICS EXPRESS, 2022, 30 (25) : 45862 - 45882
  • [6] Group Secret-Key Generation Using Algebraic Rings in Wireless Networks
    Jagadeesh, Harshan
    Joshi, Rohit
    Rao, Manish
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) : 1538 - 1553
  • [7] Authentication Based on Secret-Key Generation
    Willems, Frans M. J.
    Ignatenko, Tanya
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [8] On Secret Key Generation From Multiple Observations of Wireless Channels
    Liu, Kang
    Primak, Serguei
    Wang, Xianbin
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), 2014, : 147 - 151
  • [9] Polar Coding for Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    Abbe, Emmanuel
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) : 6213 - 6237
  • [10] Polar Coding for Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    Abbe, Emmanuel
    2013 IEEE INFORMATION THEORY WORKSHOP (ITW), 2013,