Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secret key Capacity for Wireless Nakagami and Suzuki Fading Channels

Security of wireless transmission is a great challenge in secure communications. Classical methods are based on cryptographic algorithms. These methods require a secret key that must be generated securely between associated parties in communication. Another approach to security is based on wiretap channel concept and is applicable for wireless communications. Because of rather small secrecy cap...

متن کامل

Key Generation From Wireless Channels

Lifeng Lai Department of Electrical and Computer Engineering Worcester Polytechnic Institute, Worcester, MA 01609 Email: [email protected] Yingbin Liang Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 Email:[email protected] H. Vincent Poor Department of Electrical Engineering Princeton University, Princeton, NJ 08544 Email: [email protected] Wenlian...

متن کامل

On Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels

1 A Gaussian multiple-input single-output (MISO) wiretap channel model is considered, where there exists a transmitter equipped with multiple antennas, a legitimate receiver and an eavesdropper each equipped with a single antenna. We study the problem of finding the optimal input covariance that achieves ergodic secrecy capacity subject to a power constraint where only statistical information a...

متن کامل

Secret Key Extraction from Level Crossings over Unauthenticated Wireless Channels

We present an algorithm that allows two users to establish a common cryptographic key by exploiting special properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to encrypt further communications between two users. This is especially useful in mobile and ah-hoc scenarios where...

متن کامل

Secrecy via sources and channels - A secret key - Secret message rate tradeoff region

Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available – correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Journal on Selected Areas in Communications

سال: 2013

ISSN: 0733-8716

DOI: 10.1109/jsac.2013.130909