Optimal Pilot Length for Key Generation in Correlated Wireless Channels

被引:0
作者
Li, Danqi [1 ]
Yan, Shihao [2 ]
Zhang, Jia [3 ]
Sun, Jiande [3 ]
Shu, Feng [4 ,5 ,6 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[2] Edith Cowan Univ, Sch Sci, Perth, WA 6027, Australia
[3] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250061, Peoples R China
[4] Hainan Univ, Sch Informat & Commun Engn, Haikou 570228, Peoples R China
[5] Hainan Univ, Collaborat Innovat Ctr Informat Technol, Haikou 570228, Peoples R China
[6] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
关键词
Channel estimation; Correlation; Wireless communication; Communication system security; Accuracy; Eavesdropping; Vectors; Pilot length; key generation; channel correlation; channel estimation; secret key capacity; INFORMATION;
D O I
10.1109/LWC.2024.3444821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter examines the optimal pilot length for key generation in correlated wireless channels. We first deduce the secret key capacity as a function of the pilot length N and other system parameters. Then, derive two fixed-point equations to identify the optimal N with and without an eavesdropper. Our analysis and numerical results confirm the existence of the optimal N that maximizes the secret key capacity, and both results for optimal N are consistent. Furthermore, the optimal N generally decreases with average signal-to-noise ratio and maximum Doppler shift. Our examination can provide useful guidelines in designing practical key generation systems.
引用
收藏
页码:2767 / 2771
页数:5
相关论文
共 16 条
  • [1] COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING
    AHLSWEDE, R
    CSISZAR, I
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) : 1121 - 1132
  • [2] Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
    Chou, Tzu-Han
    Draper, Stark C.
    Sayeed, Akbar M.
    [J]. 2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2518 - 2522
  • [3] Dai Hui-Hui., 2008, HDB MATH FORMULAS IN
  • [4] Reconfigurable Intelligent Surface-Aided Secret Key Generation in Multi-Cell Systems
    Hu, Lei
    Sun, Chen
    Li, Guyue
    Hu, Aiqun
    Ng, Derrick Wing Kwan
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (11) : 6499 - 6513
  • [5] Huang JJ, 2015, IEEE WCNC, P1701, DOI 10.1109/WCNC.2015.7127724
  • [6] Large Intelligent Surfaces With Channel Estimation Overhead: Achievable Rate and Optimal Configuration
    Kundu, Neel Kanth
    Mckay, Matthew R.
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (05) : 986 - 990
  • [7] Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation
    Liu, Hongbo
    Yang, Jie
    Wang, Yan
    Chen, Yingying
    Koksal, Can Emre
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) : 2820 - 2835
  • [8] Reconfigurable Intelligent Surface Assisted Secret Key Generation in Quasi-Static Environments
    Lu, Tianyu
    Chen, Liquan
    Zhang, Junqing
    Cao, Kailin
    Hu, Aiqun
    [J]. IEEE COMMUNICATIONS LETTERS, 2022, 26 (02) : 244 - 248
  • [9] MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
  • [10] Amplify-and-Forward Relay Selection with Outdated Channel Estimates
    Michalopoulos, Diomidis S.
    Suraweera, Himal A.
    Karagiannidis, George K.
    Schober, Robert
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2012, 60 (05) : 1278 - 1290