A Unified Framework for Key Agreement Over Wireless Fading Channels
Author(s): Lai, Lifeng; Liang, Yingbin; Poor, H Vincent
DownloadTo refer to this page use:
http://arks.princeton.edu/ark:/88435/pr1tx3564p
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lai, Lifeng | - |
dc.contributor.author | Liang, Yingbin | - |
dc.contributor.author | Poor, H Vincent | - |
dc.date.accessioned | 2024-01-11T15:05:29Z | - |
dc.date.available | 2024-01-11T15:05:29Z | - |
dc.date.issued | 2011-12-20 | en_US |
dc.identifier.citation | Lai, Lifeng, Liang, Yingbin, Poor, H Vincent. (2012). A Unified Framework for Key Agreement Over Wireless Fading Channels. IEEE Transactions on Information Forensics and Security, 7 (2), 480 - 490. doi:10.1109/tifs.2011.2180527 | en_US |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr1tx3564p | - |
dc.description.abstract | The problem of key generation over wireless fading channels is investigated. First, a joint source-channel approach that combines existing source and channel models for key agreement over wireless fading channels is developed. It is shown that, in general, to fully exploit the resources provided by time-varying channel gains, one needs to combine both the channel model, in which Alice sends a key to Bob over a wireless channel, and the source model, in which Alice and Bob generate a key by exploiting the correlated observations obtained from the wireless fading channel. Asymptotic analyses suggest that in the long coherence time regime, the channel model is asymptotically optimal. On the other hand, in the high power regime, the source model is asymptotically optimal. Second, the framework is extended to the scenario with an active attacker. Assuming that the goal of the attacker is to minimize the key rate that can be generated using the proposed protocol and the attacker will employ such an attack strategy, the attacker's optimal attack strategy is identified and the key rate under this attack model is characterized. | en_US |
dc.format.extent | 480 - 490 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | IEEE Transactions on Information Forensics and Security | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | A Unified Framework for Key Agreement Over Wireless Fading Channels | en_US |
dc.type | Journal Article | en_US |
dc.identifier.doi | doi:10.1109/tifs.2011.2180527 | - |
dc.identifier.eissn | 1556-6021 | - |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/journal-article | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
keyagrejournal-revision.pdf | 195.15 kB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.