SECRET KEY GENERATION FROM MULTIPLE COOPERATIVE HELPERS BY RATE UNLIMITED PUBLIC COMMUNICATION

被引:0
作者
Yang, Bin [1 ]
Wang, Wenjie [1 ]
Yin, Qinye [1 ]
机构
[1] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian 710049, Peoples R China
来源
2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP) | 2014年
关键词
Secret key generation; cooperative helpers; physical layer security; INFORMATION; AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
This paper investigates the secret key generation from multiple cooperative sources. We assume that the public communication between the legitimate users has unlimited capacity. In this case, the secret key rate is the upper bound of a practical system with limited public communication. The random signals from the multiple helpers can help to create correlated Gaussian sources for the legitimate users to generate secret key, and only local channel state information (CSI) is needed by the helpers to cooperate with others. The power allocation between the helpers is studied with a total transmit power constraint, which results in a non-convex optimization problem. A high efficiency sub-optimal solution is proposed. And even when the legitimate users have no idea about the eavesdropper, the scheme still can help the system to achieve fairly good performance.
引用
收藏
页数:5
相关论文
共 14 条
[1]   Noncoherent Capacity of Secret-Key Agreement With Public Discussion [J].
Agrawal, Anurag ;
Rezki, Zouheir ;
Khisti, Ashish J. ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :565-574
[2]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]  
Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
[5]   Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent [J].
Chou, Tzu-Han ;
Draper, Stark C. ;
Sayeed, Akbar M. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (04) :2455-2474
[6]   Secret-Key Generation Using Correlated Sources and Channels [J].
Khisti, Ashish ;
Diggavi, Suhas N. ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) :652-670
[7]  
Ling C, 2013, IEEE INT SYMP INFO, P2621, DOI 10.1109/ISIT.2013.6620701
[8]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
[9]   Secret Key Generation for Correlated Gaussian Sources [J].
Nitinawarat, Sirin ;
Narayan, Prakash .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (06) :3373-3391
[10]   Capacity of multi-antenna Gaussian channels [J].
Telatar, E .
EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1999, 10 (06) :585-595