2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2012
DOI: 10.1109/allerton.2012.6483378
|View full text |Cite
|
Sign up to set email alerts
|

Interactive secret key generation over reciprocal fading channels

Abstract: We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block-fading channel. The channel gains between the legitimate terminals are not revealed to any terminal, whereas the channel gains of the eavesdropper are revealed perfectly to the eavesdropper. We study a separation based scheme that involves a training phase followed by a communication phase within each block. The training phase generates correlated estimates of the channel state sequence between the two termina… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 26 publications
1
7
0
Order By: Relevance
“…3. The plot marked with circles is an achievable rate using the separation based scheme when the public discussion channel is not available [33]. We do not develop this lower bound in the paper as it appears to exhibit a considerable gap from the upper bound.…”
Section: Numerical Comparisonsmentioning
confidence: 99%
“…3. The plot marked with circles is an achievable rate using the separation based scheme when the public discussion channel is not available [33]. We do not develop this lower bound in the paper as it appears to exhibit a considerable gap from the upper bound.…”
Section: Numerical Comparisonsmentioning
confidence: 99%
“…In this case, the overall precoder V in (20) should be represented by a finite set of B-bit codebook W = {C 1 , C 2 , . .…”
Section: Precoder Design For Partial Csimentioning
confidence: 99%
“…Moreover, the security of the generated key does not depend on the difficulty of computational problems but on the physical properties of the wireless fading channels, thus enabling universality. Given these advantages, SKG based on wireless channels has gained considerable attention [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…Studies on SKG mainly focus on passive eavesdropping, where an eavesdropper located more than halfwave length away from legitimate users will only obtain uncorrelated channel measurements, and thus cannot acquire any information about the generated key [8]. Unfortunately, SKG is vulnerable to active attacks [9][10][11][12] because the eavesdropper not only acquires but actively transmits information to legitimate nodes and contaminates the uniqueness and privacy of the wireless channels, thus intercepting more channel state information (CSI).…”
Section: Introductionmentioning
confidence: 99%