Secret Key Generation From Mobility

被引:0
作者
Gungor, Onur [1 ]
Chen, Fangzhou [1 ]
Koksal, C. Emre [1 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
来源
2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) | 2011年
关键词
WIDE-BAND LOCALIZATION; FUNDAMENTAL LIMITS; INFORMATION; AGREEMENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.
引用
收藏
页码:874 / 878
页数:5
相关论文
共 15 条
  • [1] COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING
    AHLSWEDE, R
    CSISZAR, I
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) : 1121 - 1132
  • [2] [Anonymous], 2006, Elements of Information Theory
  • [3] [Anonymous], P IEEE INT C ULTR IC
  • [4] Bloch M. R., 2011, ARXIV11055419V1CSIT
  • [5] Buhrman H., 2010, POSITION BASED QUANT
  • [6] Chandran Nishanth., 2009, POSITION BASED CRYPT
  • [7] Secrecy capacities for multiterminal channel models
    Csiszar, Imre
    Narayan, Prakash
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2437 - 2452
  • [8] Localization via ultra-wideband radios
    Gezici, S
    Tian, Z
    Giannakis, GB
    Kobayashi, H
    Molisch, AF
    Poor, HV
    Sahinoglu, Z
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2005, 22 (04) : 70 - 84
  • [9] MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
  • [10] Unconditionally secure key agreement and the intrinsic conditional information
    Maurer, UM
    Wolf, S
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (02) : 499 - 514