TY - GEN
T1 - Key agreement over wireless fading channels with an active attacker
AU - Lai, Lifeng
AU - Liang, Yingbin
AU - Poor, H. Vincent
PY - 2010
Y1 - 2010
N2 - The problem of establishing a key over a wireless fading channel in the presence of an active attacker is considered. A key agreement protocol that combines the existing source model approach and channel model approach is adopted. First, the attacker's optimal attack strategy for this protocol is characterized. Then, the rate of the key that can be generated under this attack strategy is quantified. It is shown that, unlike the corresponding situation in wireline communications, it is possible to establish a key in the presence of an active attacker in wireless fading channels.
AB - The problem of establishing a key over a wireless fading channel in the presence of an active attacker is considered. A key agreement protocol that combines the existing source model approach and channel model approach is adopted. First, the attacker's optimal attack strategy for this protocol is characterized. Then, the rate of the key that can be generated under this attack strategy is quantified. It is shown that, unlike the corresponding situation in wireline communications, it is possible to establish a key in the presence of an active attacker in wireless fading channels.
UR - http://www.scopus.com/inward/record.url?scp=79952401767&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79952401767&partnerID=8YFLogxK
U2 - 10.1109/ALLERTON.2010.5707076
DO - 10.1109/ALLERTON.2010.5707076
M3 - Conference contribution
AN - SCOPUS:79952401767
SN - 9781424482146
T3 - 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
SP - 1391
EP - 1396
BT - 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
T2 - 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Y2 - 29 September 2010 through 1 October 2010
ER -