• DocumentCode
    2897901
  • Title

    Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

  • Author

    Wallace, Jon

  • Author_Institution
    Sch. of Eng. & Sci., Jacobs Univ. Bremen, Bremen, Germany
  • fYear
    2009
  • fDate
    14-18 June 2009
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    There is growing interest in wireless security methods that provide strong or even perfect secrecy by taking advantage of features of the physical propagation channel. In advantage-based methods, high channel quality in an average or opportunistic sense is exploited between two legitimate nodes, such that nonzero secrecy capacity can be achieved. Since such methods require bounds on the quality of the eavesdropper channel, they are somewhat impractical. Secret key generation based on tracking channel evolution in time division duplex systems is a more attractive option, where two nodes generate secret key bits based on a mutually known random channel. Since the eavesdropper channel is typically independent of the legitimate channel, the key can only be broken by brute force attacks, which are difficult when new keys are continuously generated. In this paper, the information theoretic limits of key generation schemes are investigated, based on the level of estimation error, temporal correlation, and dependence of the eavesdropper and legitimate channels. Three practical candidate key generation schemes are also considered: channel quantization and channel quantization with guardband.
  • Keywords
    channel capacity; quantisation (signal); radio networks; telecommunication security; time division multiplexing; wireless channels; advantage-based methods; channel quality; channel quantization; eavesdropper channel; guardband; information theoretic limits; nonzero secrecy capacity; performance limits; physical layer key generation schemes; physical propagation channel; secret key generation; time division duplex systems; tracking channel evolution; wireless security methods; Communication system security; Estimation error; Fading; Fluctuations; Information analysis; MIMO; Peer to peer computing; Physical layer; Quantization; Wireless communication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications, 2009. ICC '09. IEEE International Conference on
  • Conference_Location
    Dresden
  • ISSN
    1938-1883
  • Print_ISBN
    978-1-4244-3435-0
  • Electronic_ISBN
    1938-1883
  • Type

    conf

  • DOI
    10.1109/ICC.2009.5199440
  • Filename
    5199440