TY - GEN
T1 - The role of channel states in secret key generation
AU - He, Xiang
AU - Yener, Aylin
PY - 2010/12/1
Y1 - 2010/12/1
N2 - In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delay-based attack, that observing its own channel states is not the only way an adversary can learn about the channel states of the legitimate communicating parties. The attack suggests that it is not secure to transmit data via the channel whose states generate secret keys. However, not using the channel at all would result in a waste of bandwidth. Hence, we propose using this channel to transmit the bits needed to reconcile the channel state estimates at the transmitter and the receiver. This is a necessary step in secret key generation that required a separate channel in previous work. Although the scheme proposed here in effect prohibits the use of an adaptive transmitter, we show, for the Rayleigh fading channel, that a decent key rate that outperforms existing schemes is obtained. This is due to the fact that collection of the channel state information and transmission of the reconciliation bits are performed concurrently rather than via time sharing.
AB - In this work, we investigate secret key generation from channel states. We point out, by means of a packet-delay-based attack, that observing its own channel states is not the only way an adversary can learn about the channel states of the legitimate communicating parties. The attack suggests that it is not secure to transmit data via the channel whose states generate secret keys. However, not using the channel at all would result in a waste of bandwidth. Hence, we propose using this channel to transmit the bits needed to reconcile the channel state estimates at the transmitter and the receiver. This is a necessary step in secret key generation that required a separate channel in previous work. Although the scheme proposed here in effect prohibits the use of an adaptive transmitter, we show, for the Rayleigh fading channel, that a decent key rate that outperforms existing schemes is obtained. This is due to the fact that collection of the channel state information and transmission of the reconciliation bits are performed concurrently rather than via time sharing.
UR - http://www.scopus.com/inward/record.url?scp=78751485966&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78751485966&partnerID=8YFLogxK
U2 - 10.1109/PIMRC.2010.5671794
DO - 10.1109/PIMRC.2010.5671794
M3 - Conference contribution
AN - SCOPUS:78751485966
SN - 9781424480166
T3 - IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
SP - 2681
EP - 2686
BT - 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
T2 - 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC 2010
Y2 - 26 September 2010 through 30 September 2010
ER -