메뉴 건너뛰기




Volumn 7, Issue 5, 2012, Pages 1484-1497

Exploiting channel diversity in secret key generation from multipath fading randomness

Author keywords

Channel diversity; common randomness; LDPC codes; secret key generation; Slepian Wolf decoder

Indexed keywords

CHANNEL DIVERSITY; COMMON RANDOMNESS; LDPC CODES; SECRET KEY; SLEPIAN-WOLF;

EID: 84866269425     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2206385     Document Type: Article
Times cited : (164)

References (45)
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 5
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 6
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Jul
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszár, I.2
  • 8
    • 70449469434 scopus 로고    scopus 로고
    • Minimum energy per bit for secret key acquisition over multipath wireless channels
    • Jun
    • T.-. Chou, A. M. Sayeed, and S. C. Draper, "Minimum energy per bit for secret key acquisition over multipath wireless channels," in Proc. Int. Symp. Inform. Theory, Jun. 2009, pp. 2296-2300.
    • (2009) Proc. Int. Symp. Inform. Theory , pp. 2296-2300
    • Chou, T.1    Sayeed, A.M.2    Draper, S.C.3
  • 9
    • 84858994663 scopus 로고    scopus 로고
    • Key generation using external source excitation: Capacity, reliability and secrecy exponent
    • Ar
    • T.-H. Chou, S. C. Draper, and A. M. Sayeed, "Key generation using external source excitation: Capacity, reliability and secrecy exponent," IEEE Trans. Inf. Theory, vol. 58, no. 4, pp. 2455-2474, Apr. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.4 , pp. 2455-2474
    • Chou, T.-H.1    Draper, S.C.2    Sayeed, A.M.3
  • 10
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • DOI 10.1109/TIFS.2007.902666
    • R.Wilson, D. Tse, R. A. Scholtz, and L. Fellow, "Channel identification: Secret sharing using reciprocity in UWB channels," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pt. 1, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 12
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly Gaussian random variables
    • DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly Gaussian random variables," in Proc. Int. Symp. Inform. Theory, Jul. 2006, pp. 2593-2597. (Pubitemid 351244572)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 13
    • 52349088850 scopus 로고    scopus 로고
    • Secret key generation for correlated Gaussian sources
    • Jul.
    • S. Nitinawarat, "Secret key generation for correlated Gaussian sources," in Proc. Int. Symp. Inform. Theory, Jul. 2007, pp. 702-706.
    • (2007) Proc. Int. Symp. Inform. Theory , pp. 702-706
    • Nitinawarat, S.1
  • 14
    • 77955675787 scopus 로고    scopus 로고
    • Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
    • Jun.
    • T.-H. Chou, A. M. Sayeed, and S. C. Draper, "Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness," in Proc. Int. Symp. Inform. Theory, Jun. 2010, pp. 2518-2522.
    • (2010) Proc. Int. Symp. Inform. Theory , pp. 2518-2522
    • Chou, T.-H.1    Sayeed, A.M.2    Draper, S.C.3
  • 15
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 16
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part II: The simulatability condition
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part II: The simulatability condition," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, Apr. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.1    Wolf, S.2
  • 17
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification
    • Apr
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part III: Privacy amplification," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 839-851, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 19
    • 80051723522 scopus 로고    scopus 로고
    • Noncoherent capacity of secret-key agreement with public discussion
    • Se
    • A. Agrawal, Z. Rezki, A. J. Khisti, and M. Alouini, "Noncoherent capacity of secret-key agreement with public discussion," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pt. 1, pp. 565-574, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 PART 1 , pp. 565-574
    • Agrawal, A.1    Rezki, Z.2    Khisti, A.J.3    Alouini, M.4
  • 20
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • Jan
    • J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
    • (1995) IEEE Trans. Commun. , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 22
    • 60149097098 scopus 로고    scopus 로고
    • Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
    • Jun.
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel," ACM MobiCom, pp. 128-139, Jun. 2008.
    • (2008) ACM MobiCom , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 23
    • 77952604175 scopus 로고    scopus 로고
    • Information-theoretically secret key generation for fading wireless channels
    • Jun
    • C.Ye, S.Mathur,A. Reznik,Y. Shah, W. Trappe, and N. B. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Theory, vol. 5, no. 2, pp. 240-254, Jun. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.5 , Issue.2 , pp. 240-254
    • Ye, C.1    Mathur, S.2    Reznik, A.3    Shah, Y.4    Trappe, W.5    Mandayam, N.B.6
  • 24
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • Sep.
    • S. Jana, S. N. Premnath, M. Clark, and S. K. Kasera, "On the effectiveness of secret key extraction from wireless signal strength in real environments," ACM MobiCom, pp. 321-332, Sep. 2009.
    • (2009) ACM MobiCom , pp. 321-332
    • Jana, S.1    Premnath, S.N.2    Clark, M.3    Kasera, S.K.4
  • 25
    • 79961063540 scopus 로고    scopus 로고
    • Proximate: Proximity-based secure pairing using ambient wireless signals
    • Jun.
    • S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam, "Proximate: Proximity-based secure pairing using ambient wireless signals," ACM MobiSys, pp. 211-224, Jun. 2011.
    • (2011) ACM MobiSys , pp. 211-224
    • Mathur, S.1    Miller, R.2    Varshavsky, A.3    Trappe, W.4    Mandayam, N.5
  • 26
    • 38549124508 scopus 로고    scopus 로고
    • Fingerprints in the ether: Using the physical layer for wireless authentication
    • DOI 10.1109/ICC.2007.767, 4289438, 2007 IEEE International Conference on Communications, ICC'07
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: Using the physical layer for wireless authentication," in Proc. Int. Conf. Commun., Jun. 2007, pp. 4646-4651. (Pubitemid 351146262)
    • (2007) IEEE International Conference on Communications , pp. 4646-4651
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 27
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication under time-variant channels
    • Jul
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication under time-variant channels," IEEE Trans.Wireless Commun., vol. 7, no. 7, pp. 2571-2579, Jul. 2008.
    • (2008) IEEE Trans.Wireless Commun. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 28
    • 84866266156 scopus 로고    scopus 로고
    • Secure spaces: Location-based secure group communication for wireless networks
    • Sep
    • S. Banerjee and A. Mishra, "Secure spaces: Location-based secure group communication for wireless networks," ACM MobiCom, vol. 7, pp. 68-70, Sep. 2002.
    • (2002) ACM MobiCom , vol.7 , pp. 68-70
    • Banerjee, S.1    Mishra, A.2
  • 29
    • 77955667690 scopus 로고    scopus 로고
    • Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis
    • Se
    • J. W. Wallace and R. K. Sharma, "Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis," IEEE Trans. Inf. Forenics Security, vol. 5, no. 3, pp. 381-392, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forenics Security , vol.5 , Issue.3 , pp. 381-392
    • Wallace, J.W.1    Sharma, R.K.2
  • 32
    • 77951098595 scopus 로고    scopus 로고
    • Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM
    • Dec.
    • S. Yasukawa, H. Iwai, and H. Sasaoka, "Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM," in Proc. Int. Symp. Inform. Theory, Dec. 2008, pp. 7-10.
    • (2008) Proc. Int. Symp. Inform. Theory , pp. 7-10
    • Yasukawa, S.1    Iwai, H.2    Sasaoka, H.3
  • 34
    • 74549208614 scopus 로고    scopus 로고
    • On key agreement in wireless sensor networks based on radio transmission properties
    • Oct.
    • M. Wilhelm, I. Martinovic, and J. B. Schmitt, "On key agreement in wireless sensor networks based on radio transmission properties," in Proc. Sec. Netwk. Protoc. Workshop, Oct. 2009, pp. 37-42.
    • (2009) Proc. Sec. Netwk. Protoc. Workshop , pp. 37-42
    • Wilhelm, M.1    Martinovic, I.2    Schmitt, J.B.3
  • 35
    • 84885496929 scopus 로고    scopus 로고
    • Wireless communication and sensing in multipath environments using multi-antenna transceivers
    • S. Haykin and K. J. R. Liu, Eds. Hoboken, NJ: Wiley, Apr. ch. 5
    • A. M. Sayeed and T. Sivanadyan, "Wireless communication and sensing in multipath environments using multi-antenna transceivers," in Handbook on Array Processing and Sensor Networks, S. Haykin and K. J. R. Liu, Eds. Hoboken, NJ: Wiley, Apr. 2010, ch. 5.
    • (2010) Handbook on Array Processing and Sensor Networks
    • Sayeed, A.M.1    Sivanadyan, T.2
  • 36
    • 9444241599 scopus 로고    scopus 로고
    • OFDM systems in the presence of phase noise: Consequences and solutions
    • Nov
    • S. Wu and Y. Bar-Ness, "OFDM systems in the presence of phase noise: consequences and solutions," IEEE Trans. Commun., vol. 52, no. 11, pp. 1988-1996, Nov. 2004.
    • (2004) IEEE Trans. Commun. , vol.52 , Issue.11 , pp. 1988-1996
    • Wu, S.1    Bar-Ness, Y.2
  • 38
    • 67349267981 scopus 로고    scopus 로고
    • Moments of the product and ratio of two correlated chisquare variables
    • Mar.
    • A. Joarder, "Moments of the product and ratio of two correlated chisquare variables," Statistical Papers, vol. 50, pp. 581-592, Mar. 2009.
    • (2009) Statistical Papers , vol.50 , pp. 581-592
    • Joarder, A.1
  • 40
  • 41
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • Jul
    • D. Slepian and J. K.Wolf, "Noiseless coding of correlated information sources," IEEETrans. Inf. Theory, vol. 19, no. 4, pp. 471-480, Jul. 1973.
    • (1973) IEEETrans. Inf. Theory , vol.19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 42
    • 0036955307 scopus 로고    scopus 로고
    • A phase noise suppression algorithm for OFDM-based WLANs
    • Dec
    • S. Wu and Y. Bar-Ness, "A phase noise suppression algorithm for OFDM-based WLANs," IEEE Commun. Lett., vol. 6, no. 12, pp. 535-537, Dec. 2002.
    • (2002) IEEE Commun. Lett. , vol.6 , Issue.12 , pp. 535-537
    • Wu, S.1    Bar-Ness, Y.2
  • 44
    • 0036611573 scopus 로고    scopus 로고
    • Spectral efficiency in the wideband regime
    • DOI 10.1109/TIT.2002.1003824, PII S0018944802040270
    • S. Verdu, "Spectral efficiency in the wideband regime," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1319-1343, Jun. 2002. (Pubitemid 34759847)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.6 , pp. 1319-1343
    • Verdu, S.1
  • 45
    • 0035246127 scopus 로고    scopus 로고
    • Design of capacity-approaching irregular low-density parity-check codes
    • DOI 10.1109/18.910578, PII S0018944801007386
    • T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke, "Design of capacity-approaching irregular low-density parity-check codes," IEEE Trans. Inf. Theory, vol. 47, no. 2, pp. 619-637, Feb. 2001. (Pubitemid 32318093)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.2 , pp. 619-637
    • Richardson, T.J.1    Shokrollahi, M.A.2    Urbanke, R.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.