메뉴 건너뛰기




Volumn 7, Issue 2, 2012, Pages 480-490

A unified framework for key agreement over wireless fading channels

Author keywords

Active security attack; information theoretic security; key generation; key rate; optimal attack strategy

Indexed keywords

ATTACK STRATEGIES; INFORMATION-THEORETIC SECURITY; KEY GENERATION; KEY RATE; SECURITY ATTACKS;

EID: 84858388451     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2180527     Document Type: Conference Paper
Times cited : (89)

References (29)
  • 1
    • 76249088301 scopus 로고    scopus 로고
    • A unified framework for key agreement over wireless fading channels
    • Taormina, Sicily, Italy, Oct.
    • L. Lai and H. V. Poor, "A unified framework for key agreement over wireless fading channels," in Proc. IEEE Inform. Theory Workshop, Taormina, Sicily, Italy, Oct. 2009.
    • (2009) Proc. IEEE Inform. Theory Workshop
    • Lai, L.1    Poor, H.V.2
  • 4
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inform. Theory, vol. 54, no. 10., pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 5
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun.
    • Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 6
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sep.
    • R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inform. Forensics Security, vol. 2, no. 5, pp. 364-375, Sep. 2007.
    • (2007) IEEE Trans. Inform. Forensics Security , vol.2 , Issue.5 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 7
    • 70449469434 scopus 로고    scopus 로고
    • Minimum energy per bit for secret key acquisition over multipath wireless channels
    • Seoul, Korea, Jun.
    • T.-H. Chou, A.M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. IEEE Int. Symp. Inform. Theory, Seoul, Korea, Jun. 2009.
    • (2009) Proc. IEEE Int. Symp. Inform. Theory
    • Chou, T.-H.1    Sayeed, A.M.2    Draper, S.C.3
  • 8
    • 77955675787 scopus 로고    scopus 로고
    • Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
    • Austin, TX, Jun.
    • T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness," in Proc. IEEE Int. Symp. Inform. Theory, Austin, TX, Jun. 2010.
    • (2010) Proc. IEEE Int. Symp. Inform. Theory
    • Chou, T.-H.1    Sayeed, A.M.2    Draper, S.C.3
  • 12
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, Part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform. Theory, vol. 39, no. 7, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inform. Theory , vol.39 , Issue.7 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 13
    • 0037396695 scopus 로고    scopus 로고
    • Secret key agreement over a non-authenticated channel-Part I: Definitions and bounds
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel-Part I: Definitions and bounds," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 14
    • 0037399113 scopus 로고    scopus 로고
    • Secret key agreement over a non-authenticated channel-Part II: The simulatability condition
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel-Part II: The simulatability condition," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 15
    • 0037396951 scopus 로고    scopus 로고
    • Secret key agreement over a non-authenticated channel-Part III: Privacy amplification
    • Apr.
    • U. M. Maurer and S. Wolf, "Secret key agreement over a non-authenticated channel-Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.M.1    Wolf, S.2
  • 16
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inform. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 17
    • 55349095058 scopus 로고    scopus 로고
    • The wiretap channel with feedback: Encryption over the channel
    • Nov.
    • L. Lai, H. El Gamal, and H. V. Poor, "The wiretap channel with feedback: Encryption over the channel," IEEE Trans. Inform. Theory, vol. 54, no. 11, pp. 5059-5067, Nov. 2008.
    • (2008) IEEE Trans. Inform. Theory , vol.54 , Issue.11 , pp. 5059-5067
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 18
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas- I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas- I: The MISOME wiretap channel," IEEE Trans. Inform. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 19
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas-II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-II: The MIMOME wiretap channel," IEEE Trans. Inform. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 20
    • 0023310427 scopus 로고
    • Gaussian arbitrarily varying channels
    • Mar.
    • B. Hughes and P. Narayan, "Gaussian arbitrarily varying channels," IEEE Trans. Inform. Theory, vol. 33, no. 3, pp. 267-284, Mar. 1987.
    • (1987) IEEE Trans. Inform. Theory , vol.33 , Issue.3 , pp. 267-284
    • Hughes, B.1    Narayan, P.2
  • 21
    • 0026055468 scopus 로고
    • Capacity of the Gaussian arbitrarily varying channel
    • Jan.
    • I. Csiszár and P. Narayan, "Capacity of the Gaussian arbitrarily varying channel," IEEE Trans. Inform. Theory, vol. 37, no. 1, pp. 18-26, Jan. 1991.
    • (1991) IEEE Trans. Inform. Theory , vol.37 , Issue.1 , pp. 18-26
    • Csiszár, I.1    Narayan, P.2
  • 22
    • 0034188649 scopus 로고    scopus 로고
    • The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel
    • May
    • M. Médard, "The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel," IEEE Trans. Inform. Theory, vol. 46, no. 5, pp. 933-946, May 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , Issue.5 , pp. 933-946
    • Médard, M.1
  • 23
    • 0037399093 scopus 로고    scopus 로고
    • How much training is needed in multiple- antenna wireless links?
    • Apr.
    • B. Hassibi and B. M. Hochwald, "How much training is needed in multiple- antenna wireless links?," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 951-963, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 951-963
    • Hassibi, B.1    Hochwald, B.M.2
  • 24
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar.
    • I. Csiszár and P. Narayan, "Common randomness and secret key generation with a helper," IEEE Trans. Inform. Theory, vol. 46, no. 3, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Inform. Theory , vol.46 , Issue.3 , pp. 344-366
    • Csiszár, I.1    Narayan, P.2
  • 25
    • 0037356065 scopus 로고    scopus 로고
    • Distributed source coding using syndromes (DISCUS): Design and construction
    • Mar.
    • S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," IEEE Trans. Inform. Theory, no. 3, pp. 626-643, Mar. 2003.
    • (2003) IEEE Trans. Inform. Theory , Issue.3 , pp. 626-643
    • Pradhan, S.1    Ramchandran, K.2
  • 26
    • 85032757506 scopus 로고    scopus 로고
    • Distributed source coding for sensor networks
    • May
    • Z. Xiong, A. Liveris, and S. Cheng, "Distributed source coding for sensor networks," IEEE Signal Processing Mag., vol. 21, pp. 80-94, May 2004.
    • (2004) IEEE Signal Processing Mag. , vol.21 , pp. 80-94
    • Xiong, Z.1    Liveris, A.2    Cheng, S.3
  • 27
    • 0020497622 scopus 로고
    • The Gaussian test channel with an intelligent jammer
    • Jan.
    • T. Basar, "The Gaussian test channel with an intelligent jammer," IEEE Trans. Inform. Theory, vol. 29, no. 1, pp. 152-157, Jan. 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.1 , pp. 152-157
    • Basar, T.1
  • 29
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO Gaussian fading channels
    • Sep.
    • A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," IEEE Trans. Inform. Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
    • (2004) IEEE Trans. Inform. Theory , vol.50 , Issue.9 , pp. 2119-2123
    • Kashyap, A.1    Basar, T.2    Srikant, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.