Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

被引:9
作者
Chou, Tzu-Han [1 ]
Sayeed, Akbar M. [1 ]
Draper, Stark C. [1 ]
机构
[1] Univ Wisconsin, Madison, WI 53706 USA
来源
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4 | 2009年
关键词
INFORMATION; AGREEMENT;
D O I
10.1109/ISIT.2009.5205918
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We study fundamental limits on the generation of secret keys based on the randomness inherent to reciprocal wireless multipath channels. Estimates of the common channel at the two ends of a link are jointly Gaussian sources from which secret keys can be generated. The key generation problem is cast as an equivalent communication problem to characterize the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit required for reliable key acquisition. Our results show that, in contrast to the low SNR behavior of conventional channel capacity, there is a non-zero SNR gamma* that achieves the minimum energy per key bit. A time-sharing scheme is proposed to achieve the minimum energy per key bit at any SNR below gamma*. We also investigate the reliability of secret key generation via error exponent analysis. In particular, our results yield a tight upper bound on the minimum energy required to generate a finite-length key with a specified probability of error in key acquisition.
引用
收藏
页码:2296 / 2300
页数:5
相关论文
共 15 条
  • [1] COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING
    AHLSWEDE, R
    CSISZAR, I
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) : 1121 - 1132
  • [2] Balanis C. A., 1997, ANTENNA THEORY ANAL
  • [3] CHOU TH, SECRET KEY GEN UNPUB
  • [4] GACS P, 1973, PROBLEMS CONTROL INF
  • [5] Gallager R. G., 1968, Information Theory and Reliable Communication, V588
  • [6] Gallager Robert., 1976, Source coding with side information and universal coding
  • [7] Cryptographic key agreement for mobile radio
    Hassan, AA
    Stark, WE
    Hershey, JE
    Chennakeshu, S
    [J]. DIGITAL SIGNAL PROCESSING, 1996, 6 (04) : 207 - 212
  • [8] MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
  • [9] Secure wireless communications: Secret keys through multipath
    Sayeed, Akbar
    Perrig, Adrian
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 3013 - +
  • [10] SHANNON C, 1949, BELL SYST TECH J, V29, P656