2018
DOI: 10.1002/dac.3559
|View full text |Cite
|
Sign up to set email alerts
|

Improving secret key generation for wireless communications in FDD mode

Abstract: Summary Most recent research on channel‐based key generation oriented to time division duplex system because the channel reciprocity feature is applied directly for secret key generation. Most of commercial cellular systems depend on frequency division duplex (FDD) systems. In this paper, we investigate the impact of uplink and downlink of FDD systems for the generation of shared secret keys between two parties in the presents of passive eavesdropper. In addition, we are considering improving the rate of the s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…The overall channel from the source to the destination via the relay, in amplifying and forwarding (A & F) systems, is two Gaussian channels with features considerably different from a typical cellular channel [12]. In our novel work [13], we developed a key extraction protocol based on the non-reciprocity of FD channel. As a result, one can design a scheme that can exploit the randomness provided by round-trip FD link between two terminals.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The overall channel from the source to the destination via the relay, in amplifying and forwarding (A & F) systems, is two Gaussian channels with features considerably different from a typical cellular channel [12]. In our novel work [13], we developed a key extraction protocol based on the non-reciprocity of FD channel. As a result, one can design a scheme that can exploit the randomness provided by round-trip FD link between two terminals.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, one can design a scheme that can exploit the randomness provided by round-trip FD link between two terminals. In this paper, we exploit this fact and extend our work in [13] to the case of cooperation communication systems. In this paper, we regard the channel estimation stage, of key extraction from FD relay channel, to prove the feasibility of establishing a common randomness source based on the FD wireless relaying channel.…”
Section: Introductionmentioning
confidence: 99%
“…For illustration, when the two nodes attempt to estimate the channel status, the adversary transmits interfering signals to minimize the accuracy of the channel estimation process. In this paper, we extend the capability of the adversary from the passive case introduced in our recent work …”
Section: Introductionmentioning
confidence: 99%