TY - JOUR
T1 - A unified framework for key agreement over wireless fading channels
AU - Lai, Lifeng
AU - Liang, Yingbin
AU - Poor, H. Vincent
N1 - Funding Information:
Manuscript received October 06, 2011; accepted November 29, 2011. Date of publication December 20, 2011; date of current version March 08, 2012. The work of L. Lai was supported by the National Science Foundation CAREER Award under Grant CCF-10-54338 and by the National Science Foundation under Grant CNS-11-16534. The work of Y. Liang was supported by the National Science Foundation CAREER Award under Grant CCF-10-26565 and by the National Science Foundation under Grant CCF-10-26566 and Grant CNS-11-16932. The work of H. V. Poor was supported by the National Science Foundation under Grant CNS-09-05398 and Grant CCF-10-16671. This paper was presented in part at the IEEE Information Theory Workshop, Taormina, Sicily, Italy, Oct. 2009, and at the Forty-Eighth Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, Sep./Oct. 2010. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Wade Trappe.
PY - 2012/4
Y1 - 2012/4
N2 - The problem of key generation over wireless fading channels is investigated. First, a joint source-channel approach that combines existing source and channel models for key agreement over wireless fading channels is developed. It is shown that, in general, to fully exploit the resources provided by time-varying channel gains, one needs to combine both the channel model, in which Alice sends a key to Bob over a wireless channel, and the source model, in which Alice and Bob generate a key by exploiting the correlated observations obtained from the wireless fading channel. Asymptotic analyses suggest that in the long coherence time regime, the channel model is asymptotically optimal. On the other hand, in the high power regime, the source model is asymptotically optimal. Second, the framework is extended to the scenario with an active attacker. Assuming that the goal of the attacker is to minimize the key rate that can be generated using the proposed protocol and the attacker will employ such an attack strategy, the attacker's optimal attack strategy is identified and the key rate under this attack model is characterized.
AB - The problem of key generation over wireless fading channels is investigated. First, a joint source-channel approach that combines existing source and channel models for key agreement over wireless fading channels is developed. It is shown that, in general, to fully exploit the resources provided by time-varying channel gains, one needs to combine both the channel model, in which Alice sends a key to Bob over a wireless channel, and the source model, in which Alice and Bob generate a key by exploiting the correlated observations obtained from the wireless fading channel. Asymptotic analyses suggest that in the long coherence time regime, the channel model is asymptotically optimal. On the other hand, in the high power regime, the source model is asymptotically optimal. Second, the framework is extended to the scenario with an active attacker. Assuming that the goal of the attacker is to minimize the key rate that can be generated using the proposed protocol and the attacker will employ such an attack strategy, the attacker's optimal attack strategy is identified and the key rate under this attack model is characterized.
KW - Active security attack
KW - information theoretic security
KW - key generation
KW - key rate
KW - optimal attack strategy
UR - http://www.scopus.com/inward/record.url?scp=84858388451&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84858388451&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2011.2180527
DO - 10.1109/TIFS.2011.2180527
M3 - Article
AN - SCOPUS:84858388451
SN - 1556-6013
VL - 7
SP - 480
EP - 490
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 2
M1 - 6109346
ER -