Stealthy Secret Key Generation

被引:3
作者
Lin, Pin-Hsun [1 ]
Janda, Carsten R. [1 ]
Jorswieck, Eduard A. [1 ]
Schaefer, Rafael F. [2 ]
机构
[1] Tech Univ Carolo Wilhelmina Braunschweig, Informat Theory & Commun Syst Dept, D-38106 Braunschweig, Germany
[2] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
secret key generation; source model; stealthy communications; covert communications; channel resolvability; conceptual wiretap channel; stochastically degraded; stochastic orders; COMMUNICATION; AGREEMENT;
D O I
10.3390/e22060679
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In order to make a warden, Willie, unaware of the existence of meaningful communications, there have been different schemes proposed including covert and stealth communications. When legitimate users have no channel advantage over Willie, the legitimate users may need additional secret keys to confuse Willie, if the stealth or covert communication is still possible. However, secret key generation (SKG) may raise Willie's attention since it has a public discussion, which is observable by Willie. To prevent Willie's attention, we consider the source model for SKG under a strong secrecy constraint, which has further to fulfill a stealth constraint. Our first contribution is that, if the stochastic dependence between the observations at Alice and Bob fulfills the strict more capable criterion with respect to the stochastic dependence between the observations at Alice and Willie or between Bob and Willie, then a positive stealthy secret key rate is identical to the one without the stealth constraint. Our second contribution is that, if the random variables observed at Alice, Bob, and Willie induced by the common random source form a Markov chain, then the key capacity of the source model SKG with the strong secrecy constraint and the stealth constraint is equal to the key capacity with the strong secrecy constraint, but without the stealth constraint. For the case of fast fading models, a sufficient condition for the existence of an equivalent model, which is degraded, is provided, based on stochastic orders. Furthermore, we present an example to illustrate our results.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Secret Key Generation With Intelligent Reflecting Surface Under the Pilot Contamination Attack
    Xia, Enjun
    Hu, Bin-Jie
    Shen, Qiaoqiao
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2024, 13 (01) : 213 - 217
  • [22] Unleashing the secure potential of the wireless physical layer: Secret key generation methods
    Badawy, Ahmed
    Elfouly, Tarek
    Khattab, Tamer
    Mohamed, Amr
    Guizani, Mohsen
    [J]. PHYSICAL COMMUNICATION, 2016, 19 : 1 - 10
  • [23] Adaptive Secret Key Generation in Underwater Acoustic System
    Murthy, T. S. N.
    Reddyka, G. Satish
    Padmaraju, K.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 698 - 702
  • [24] Secret Key Generation and Agreement in UWB Communication Channels
    Madiseh, Masoud Ghoreishi
    McGuire, Michael L.
    Neville, Stephen S.
    Cai, Lin
    Horie, Michael
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [25] Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness
    Liu, Yanpei
    Draper, Stark C.
    Sayeed, Akbar M.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) : 1484 - 1497
  • [26] Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (08) : 4941 - 4957
  • [27] Secret Key Generation Method Based on Multi-stream Random Signal
    Jin Liang
    Cai Aolin
    Huang Kaizhi
    Zhong Zhou
    Lou Yangming
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1405 - 1412
  • [28] Secret Key Generation Schemes for Physical Layer Security
    Kumar, Megha S.
    Ramanathan, R.
    Jayakumar, M.
    Yadav, Devendra Kumar
    [J]. DEFENCE SCIENCE JOURNAL, 2021, 71 (04) : 545 - 555
  • [29] Generalized Channel Probing and Generalized Pre-Processing for Secret Key Generation
    Hua, Yingbo
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2023, 71 : 1067 - 1082
  • [30] Optimal Downlink Training Sequence for Massive MIMO Secret-Key Generation
    Rottenherg, Francois
    [J]. SPAWC 2021: 2021 IEEE 22ND INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (IEEE SPAWC 2021), 2020, : 41 - 45