Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness

被引:23
作者
Chou, Tzu-Han [1 ]
Draper, Stark C. [1 ]
Sayeed, Akbar M. [1 ]
机构
[1] Univ Wisconsin, Madison, WI 53706 USA
来源
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY | 2010年
关键词
AGREEMENT;
D O I
10.1109/ISIT.2010.5513556
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study secret key generation from reciprocal multipath wireless channels modeled as multiple parallel fading channels. We consider two channel characteristics that heavily impact secret key capacity: channel sparsity and correlation between main and eavesdropper's channels. We propose a joint model to capture the channel sparsity and correlated eavesdropping. For the case without eavesdroppers, we show that at each transmitter SNR gamma there is an optimal sparsity 0 <= rho(opt) <= 1, which specifies the fraction of non-zero channel coefficients, that yields the maximum secret key capacity. The reduction in secret key capacity due to eavesdropping is due to two sources. First is the overlap between the main and eavesdropper channels, i.e., the pattern of non-zero subchannels common to both. The second is the correlation between the channel coefficients of the overlapping channels. We show that when the power of the training signal is uniformly distributed over the non-zero channels, there is a cutoff SNR gamma(c) below which the secret key rate is zero, but non-zero (and increasing in.) when gamma > gamma(c). We also show that in the low SNR regime, the optimal input signal is peaky (a non-uniform training signal) by which the secret key capacity is non-zero at all gamma > 0.
引用
收藏
页码:2518 / 2522
页数:5
相关论文
共 16 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]   SPARSE MULTIPATH CHANNELS: MODELING AND ESTIMATION [J].
Bajwa, Waheed U. ;
Sayeed, Akbar ;
Nowak, Robert .
2009 IEEE 13TH DIGITAL SIGNAL PROCESSING WORKSHOP & 5TH IEEE PROCESSING EDUCATION WORKSHOP, VOLS 1 AND 2, PROCEEDINGS, 2009, :320-325
[3]  
CHOU TH, 2009, INF THEOR 2009 ISIT
[4]  
CHOU TH, SECRET KEY GEN UNPUB
[5]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[6]   Measurement and modeling of an ultra-wide bandwidth indoor channel [J].
Ghassemzadeh, SS ;
Jana, R ;
Rice, CW ;
Turin, W ;
Tarokh, V .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2004, 52 (10) :1786-1796
[7]   Cryptographic key agreement for mobile radio [J].
Hassan, AA ;
Stark, WE ;
Hershey, JE ;
Chennakeshu, S .
DIGITAL SIGNAL PROCESSING, 1996, 6 (04) :207-212
[8]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
[9]  
Nitinawarat S., 2007, P 45 ANN ALL C
[10]  
Sayeed A., 2006, P ASAP