Advanced Search
Volume 38 Issue 10
Oct.  2016
Turn off MathJax
Article Contents
WANG Xu, JIN Liang, SONG Huawei, HUANG Kaizhi. Physical Layer Secret Key Capacity Based on Wireless Channel Parameters[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2612-2618. doi: 10.11999/JEIT160032
Citation: WANG Xu, JIN Liang, SONG Huawei, HUANG Kaizhi. Physical Layer Secret Key Capacity Based on Wireless Channel Parameters[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2612-2618. doi: 10.11999/JEIT160032

Physical Layer Secret Key Capacity Based on Wireless Channel Parameters

doi: 10.11999/JEIT160032
Funds:

The National 863 Program of China (2015AA01A708), The National Natural Science Foundation of China (61171108, 61471396)

  • Received Date: 2016-01-11
  • Rev Recd Date: 2016-06-06
  • Publish Date: 2016-10-19
  • Physical layer secret key capacity is affected by such factors as additive noise, the time difference of channel sampling, terminals moving speed, sampling period, and the number of samples, whose effects on the physical layer secret key capacity are analyzed quantitatively using the single-input single-output wireless channel over the uniform scattering environment. Specifically, a closed-form solution to the secret key capacity is derived to determine the constraints on the optimal sampling period. Analysis and simulation results reveal that the results can also be applied to the nonuniform scattering environment. Furthermore, the feasibility to utilize the physical layer secret key extraction techniques in the mobile communication systems is verified.
  • loading
  • SHEHADEH Y E H and HOGREFE D. A survey on secret key generation mechanisms on the physical layer in wireless networks[J]. Security and Communication Networks, 2015, 8(2): 332-341. doi: 10.1002/sec.973.
    WANG T, LIU Y, and VASILAKOS A V. Survey on channel reciprocity based key establishment techniques for wireless systems[J]. Wireless Networks, 2015, 21(6): 1835-1846. doi: 10.1007/s11276-014-0841-8.
    PREMNATH S N, JANA S, CROFT J, et al. Secret key extraction from wireless signal strength in real environments[J]. IEEE Transactions on Mobile Computing, 2013, 12(5): 917-930. doi: 10.1109/TMC.2012.63.
    CHOU T H, DRAPER S C, and SAYEED A M. Key generation using external source excitation: capacity, reliability, and secrecy exponent[J]. IEEE Transactions on Information Theory, 2012, 58(4): 2455-2474. doi: 10.1109/ TIT.2011.2176311.
    LIU Y, DRAPER S C, and SAYEED A M. Exploiting channel diversity in secret key generation from multipath fading randomness[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(5): 1484-1497. doi: 10.1109/ TIFS.2012.2206385.
    WALLACE J W and SHARMA R K. Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(3): 381-392. doi: 10.1109/TIFS.2010. 2052253.
    TSOURI G R and WAGNER D M. Threshold constraints on symmetric key extraction from rician fading estimates[J]. IEEE Transactions on Mobile Computing, 2013, 12(12): 2496-2506. doi: 10.1109/TMC.2012.226.
    戴峤, 宋华伟, 金梁, 等. 基于等效信道的物理层认证和密钥分发机制[J]. 中国科学: 信息科学, 2014, 44(12): 1580-1592. doi: 10.1360/N112013-00041.
    DAI Q, SONG H W, JIN L, et al. Physical-layer authentication and key distribution mechanism based on equivalent channel[J]. Scientia Sinica Informationis, 2014, 44(12): 1580-1592. doi: 10.1360/N112013-00041.
    MAURER U M. Secret key agreement by public discussion from common information[J]. IEEE Transactions on Information Theory, 1993, 39(3): 733-742. doi: 10.1109/18. 256484.
    AHLSWEDE R and CSISZ R I. Common randomness in information theory and cryptography. Part I: Secret sharing[J]. IEEE Transactions on Information Theory, 1993, 39(4): 1121-1132. doi: 10.1109/18.243431.
    AHLSWEDE R and CSISZ R I. Common randomness in information theory and cryptography. Part II: CR capacity[J]. IEEE Transactions on Information Theory, 1998, 44(1): 225-240. doi: 10.1109/18.651026.
    PATWARI N, CROFT J, JANA S, et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J]. IEEE Transactions on Mobile Computing, 2010, 9(1): 17-30. doi: 10.1109/TMC. 2009.88.
    SHEHADEH Y E H, ALFANDI O, and HOGREFE D. On improving the robustness of physical-layer key extraction mechanisms against delay and mobility[C]. Proceedings of International Wireless Communications and Mobile Computing Conference, Limassol, Cyprus, 2012: 1028-1033. doi: 10.1109/IWCMC.2012.6314347.
    SHEHADEH Y E H, ALFANDI O, and HOGREFE D. Towards robust key extraction from multipath wireless channels[J]. Journal of Communications and Networks, 2012, 14(4): 385-395. doi: 10.1109/JCN.2012.6292245.
    NITINAWARAT S and NARAYAN P. Secret key generation for correlated Gaussian sources[J]. IEEE Transactions on Information Theory, 2012, 58(6): 3373-3391. doi: 10.1109/ TIT.2012.2184075.
    WU X F, SONG Y, ZHAO C, et al. Secrecy extraction from correlated fading channels: an upper bound[C]. Proceedings of International Conference on Wireless Communications Signal Processing, Nanjing, China, 2009: 1-3. doi: 10.1109/ WCSP.2009.5371757.
    CHEN C and JENSEN M. Secret key establishment using temporally and spatially correlated wireless channel coefficients[J]. IEEE Transactions on Mobile Computing, 2011, 10(2): 205-215. doi: 10.1109/TMC.2010.114.
    CLARKE R. A statistical theory of mobile-radio reception [J]. Bell System Technical Journal, 1968, 47(6): 957-1000. doi: 10.1002/j.1538-7305.1968.tb00069.x.
    JAKES W C and COX D C. Microwave Mobile Communications[M]. New Jersey: Wiley-IEEE Press, 1994: 13-39.
    GOLDSMITH A. Wireless Communications[M]. Cambridge: Cambridge University Press, 2005: 63-76.
    COVER T M and THOMAS J A. Elements of Information Theory[M]. New York: John Wiley Sons, 2012: 247-252.
    ZENG X and DURRANI T. Estimation of mutual information using copula density function[J]. Electronics Letters, 2011, 47(8): 493-494. doi: 10.1049/el.2011.0778.
    MA J and SUN Z. Mutual information is copula entropy[J]. Tsinghua Science Technology, 2011, 16(1): 51-54. doi: 10.1016/S1007-0214(11)70008-6.
    韩敏, 刘晓欣. 基于Copula熵的互信息估计方法[J]. 控制理论与应用, 2013, 30(7): 875-879. doi: 10.7641/CTA.2013. 21262.
    HAN M and LIU X X. Mutual information estimation based on Copula entropy[J]. Control Theory Applications, 2013, 30(7): 875-879. doi: 10.7641/CTA.2013. 21262.
    FONT N F P and ESPI EIRA P M. Modelling the Wireless Propagation Channel: a Simulation Approach with Matlab [M]. New York: John Wiley Sons, 2008: 105-111.
    STEFANIA S, ISSAM T, and MATTHEW B. LTE, the UMTS Long Term Evolution: from Theory to Practice[M]. New York: John Wiley Sons, 2009: 430-453.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1477) PDF downloads(398) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return