logo

SCIENTIA SINICA Informationis, Volume 47 , Issue 3 : 362-373(2017) https://doi.org/10.1360/N112016-00001

Secret key generation scheme based on MIMO received signal spaces}{Secret key generation scheme based on MIMO received signal spaces

More info
  • ReceivedMay 16, 2016
  • AcceptedJun 28, 2016
  • PublishedNov 30, 2016

Abstract


Funded by

国家自然科学基金(61521003)

国家高技术研究发展计划(863计划)

(2015AA01A708)


References

[1] Jakes W C, Cox D C. Microwave Mobile Communications. Piscataway: Wiley-IEEE Press, 1994, 11-50. Google Scholar

[2] Maurer U M. Secret keyagreement by public discussion from common information. IEEE Trans Inf Theory, 1993, 39: 733-742 CrossRef Google Scholar

[3] Ahlswede R, Csiszar I, Ahlswede R. Common randomness in information theory and cryptography. I. Secret sharing. IEEE Trans Inf Theory, 1993, 39: 1121-1132 CrossRef Google Scholar

[4] Hershey J E, Hassan A A, Yarlagadda R. Unconventional cryptographic keying variable management. IEEE Trans Commun, 1995, 43: 3-6 CrossRef Google Scholar

[5] Aono T, Taromaru K, Ohira T, et al. Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels: RSSI interleaving scheme. In: Proceedings of European Conference on Wireless Technology, Paris, 2006. 173-176. Google Scholar

[6] Lai L, Liang Y, Du W. Cooperative key generation in wireless networks. IEEE J Sel Areas Commun, 2012, 30: 1578-1588 CrossRef Google Scholar

[7] Premnath S N, Jana S, Croft J. Secret key extraction from wireless signal strength in real environments. IEEE Trans Mobile Comput, 2013, 12: 917-930 CrossRef Google Scholar

[8] Yang B, Wang W, Yin Q. Secret key generation from multiple cooperative helpers by rate unlimited public communication. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing. New York: IEEE Press, 2014. 8183-8187. Google Scholar

[9] Renna F, Bloch M R, Laurenti N. Semi-blind key-agreement over MIMO fading channels. IEEE Trans Commun, 2013, 61: 620-627 CrossRef Google Scholar

[10] Khisti A, Wornell G W. Secure transmission with multiple antennas-part II: the MIMOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 5515-5532 CrossRef Google Scholar

[11] Zeng K, Wu D, Chan A, et al. Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In: Proceedings of the IEEE International Conference on Computer Communications. New York: IEEE Press, 2010. 1-9. Google Scholar

[12] Cumanan K, Ding Z, Sharif B, et al. Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Trans Veh Tech, 2014, 63: 1678-1690 CrossRef Google Scholar

[13] Beck A, Ben-Tal A, Tetruashvili L. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems. J Global Optim, 2009, 47: 29-51. Google Scholar

[14] Zeng X, Durrani T. Estimation of mutual information using copula density function. Electron Lett, 2011, 47: 493-494 CrossRef Google Scholar