Secret Key Generation in the Two-Way Relay Channel With Active Attackers

被引:52
作者
Zhou, Heng [1 ]
Huie, Lauren M. [2 ]
Lai, Lifeng [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[2] Air Force Res Lab, Informat Directorate, Rome, NY 13441 USA
基金
美国国家科学基金会;
关键词
Active attack; information-theoretic security; key generation; two-way relay channel; WIRELESS NETWORKS; INFORMATION; RANDOMNESS;
D O I
10.1109/TIFS.2014.2301233
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most of the existing work on key generation from wireless fading channels requires a direct wireless link between legitimate users so that they can obtain correlated observations from the common wireless link. This paper studies the key generation problem in the two-way relay channel, in which there is no direct channel between the key generating terminals. We propose an effective key generation scheme that achieves a substantially larger key rate than that of a direct channel mimic approach. Unlike existing schemes, there is no need for the key generating terminals to obtain correlated observations in our scheme. We also investigate the effects of an active attacker on the proposed key generation protocol. We characterize the optimal attacker's strategy that minimizes the key rate of the proposed scheme. Furthermore, we establish the maximal attacker's power under which our scheme can still achieve a nonzero key rate.
引用
收藏
页码:476 / 488
页数:13
相关论文
共 20 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2006, Elements of Information Theory
[3]  
Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
[4]   Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness [J].
Chou, Tzu-Han ;
Draper, Stark C. ;
Sayeed, Akbar M. .
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, :2518-2522
[5]  
Khisti A., 2012, P ALL C COMM CONTR C, P1
[6]  
Kraskov A, 2004, PHYS REV E, V69, DOI 10.1103/PhysRevE.69.066138
[7]   Cooperative Key Generation in Wireless Networks [J].
Lai, Lifeng ;
Liang, Yingbin ;
Du, Wenliang .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (08) :1578-1588
[8]   A Unified Framework for Key Agreement Over Wireless Fading Channels [J].
Lai, Lifeng ;
Liang, Yingbin ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :480-490
[9]   Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel [J].
Mathur, Suhas ;
Trappe, Wade ;
Mandayam, Narayan ;
Ye, Chunxuan ;
Reznik, Alex .
MOBICOM'08: PROCEEDINGS OF THE FOURTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2008, :128-+
[10]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484