Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage
نویسندگان
چکیده
منابع مشابه
Secret key Capacity for Wireless Nakagami and Suzuki Fading Channels
Security of wireless transmission is a great challenge in secure communications. Classical methods are based on cryptographic algorithms. These methods require a secret key that must be generated securely between associated parties in communication. Another approach to security is based on wiretap channel concept and is applicable for wireless communications. Because of rather small secrecy cap...
متن کاملKey Generation From Wireless Channels
Lifeng Lai Department of Electrical and Computer Engineering Worcester Polytechnic Institute, Worcester, MA 01609 Email: [email protected] Yingbin Liang Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 Email:[email protected] H. Vincent Poor Department of Electrical Engineering Princeton University, Princeton, NJ 08544 Email: [email protected] Wenlian...
متن کاملOn Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels
1 A Gaussian multiple-input single-output (MISO) wiretap channel model is considered, where there exists a transmitter equipped with multiple antennas, a legitimate receiver and an eavesdropper each equipped with a single antenna. We study the problem of finding the optimal input covariance that achieves ergodic secrecy capacity subject to a power constraint where only statistical information a...
متن کاملSecret Key Extraction from Level Crossings over Unauthenticated Wireless Channels
We present an algorithm that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to encrypt further communications between two users. This is especially useful in mobile and ah-hoc scenarios where...
متن کاملSecrecy via sources and channels - A secret key - Secret message rate tradeoff region
Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available – correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal on Selected Areas in Communications
سال: 2013
ISSN: 0733-8716
DOI: 10.1109/jsac.2013.130909