logo

SCIENTIA SINICA Informationis, Volume 47, Issue 3: 362-373(2017) https://doi.org/10.1360/N112016-00001

Secret key generation scheme based on MIMO received signal spaces}{Secret key generation scheme based on MIMO received signal spaces

More info
  • ReceivedMay 16, 2016
  • AcceptedJun 28, 2016
  • PublishedNov 30, 2016

Abstract

Conventional secret key generation scheme cannot achieve high key generation rate when the channel characteristics change slowly. To solve this problem, a secret key generation model based on the MIMO received signal space is investigated in this paper. In this model, the legitimate transmitter and receiver distill secret keys from the received signal space, and improve the randomness of the received signals by controlling the variance of the transmitted signals, so that the update of the secret key is independent of the time variance of the wireless channel. Then a specific key generation scheme is proposed, in which the legitimate nodes can obtain the same received signal space, from which common vectors can be selected to distill the keys. In addition, an optimal power allocation method to maximize the key rate is presented. The results of the simulation confirm the effectiveness of this scheme.


Funded by

国家自然科学基金(61521003)

国家高技术研究发展计划(863计划)

(2015AA01A708)


References

[1] Jakes W C, Cox D C. Microwave Mobile Communications. Piscataway: Wiley-IEEE Press, 1994, 11-50. Google Scholar

[2] Maurer U M. Secret keyagreement by public discussion from common information. IEEE Trans Inf Theory, 1993, 39: 733-742 CrossRef Google Scholar

[3] Ahlswede R, Csiszar I, Ahlswede R. Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans Inf Theory, 1993, 39: 1121-1132 CrossRef Google Scholar

[4] Hershey J E, Hassan A A, Yarlagadda R. Unconventional cryptographic keying variable management. IEEE Trans Commun, 1995, 43: 3-6 CrossRef Google Scholar

[5] Aono T, Taromaru K, Ohira T, et al. Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels: RSSI interleaving scheme. In: Proceedings of European Conference on Wireless Technology, Paris, 2006. 173-176. Google Scholar

[6] Lai L, Liang Y, Du W. Cooperative key generation in wireless networks. IEEE J Sel Areas Commun, 2012, 30: 1578-1588 CrossRef Google Scholar

[7] Premnath S N, Jana S, Croft J. Secret key extraction from wireless signal strength in real environments. IEEE Trans Mobile Comput, 2013, 12: 917-930 CrossRef Google Scholar

[8] Yang B, Wang W, Yin Q. Secret key generation from multiple cooperative helpers by rate unlimited public communication. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing. New York: IEEE Press, 2014. 8183-8187. Google Scholar

[9] Renna F, Bloch M R, Laurenti N. Semi-blind key-agreement over MIMO fading channels. IEEE Trans Commun, 2013, 61: 620-627 CrossRef Google Scholar

[10] Khisti A, Wornell G W. Secure transmission with multiple antennas-part II: the MIMOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 5515-5532 CrossRef Google Scholar

[11] Zeng K, Wu D, Chan A, et al. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In: Proceedings of the IEEE International Conference on Computer Communications. New York: IEEE Press, 2010. 1-9. Google Scholar

[12] Cumanan K, Ding Z, Sharif B, et al. Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Trans Veh Tech, 2014, 63: 1678-1690 CrossRef Google Scholar

[13] Beck A, Ben-Tal A, Tetruashvili L. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems. J Global Optim, 2009, 47: 29-51. Google Scholar

[14] Zeng X, Durrani T. Estimation of mutual information using copula density function. Electron Lett, 2011, 47: 493-494 CrossRef Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1