2011 IEEE International Conference on Communications (ICC) 2011
DOI: 10.1109/icc.2011.5963438
|View full text |Cite
|
Sign up to set email alerts
|

Semi-Blind Key-Agreement over MIMO Fading Channels

Abstract: We analyze the fundamental limits of secret-key agreement over MIMO quasi-static fading channels. In the low-power and high-power regimes, we establish closed-form expressions for secret-key capacity. In the low-power regime, we show that the optimal signaling strategy is independent of the eavesdropper's fading realization. The low-power secret-key capacity is achieved by transmitting along the direction corresponding to the maximal eigenvalue of the legitimate channel. By combining this signaling strategy wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
17
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…In this paper we extend the results in [18] in two different ways. First of all, we consider the realistic case in which the eavesdropper channel is not perfectly known, and following a conservative worstcase approach, we show that the robust problem can be reformulated as a convex optimization problem.…”
Section: Introductionmentioning
confidence: 57%
See 3 more Smart Citations
“…In this paper we extend the results in [18] in two different ways. First of all, we consider the realistic case in which the eavesdropper channel is not perfectly known, and following a conservative worstcase approach, we show that the robust problem can be reformulated as a convex optimization problem.…”
Section: Introductionmentioning
confidence: 57%
“…Finally, we also consider the practical cases in which the eavesdropper channel estimate is very inaccurate or not even available. In these cases, the optimal power allocation is given by a waterfilling or matched filtering like solution, which constitutes an important difference with the results obtained in [18] for low and high SNRs.…”
Section: Introductionmentioning
confidence: 96%
See 2 more Smart Citations
“…Its extension to continuous random sources has been considered in [8], while SKA among multiple terminals has been addressed in [5]. The asymptotic behavior at high and low power regimes of the secret key capacity over multiple input multiple output (MIMO) channels has been derived in [9]. The channel model provides a four-step procedure, by which Alice first transmits a sequence of random bits to Bob who performs detection.…”
mentioning
confidence: 99%