Computer Science – Information Theory
Scientific paper
2011-12-13
Computer Science
Information Theory
Proceedings of the IEEE Global Telecommunications Conference Workshop on Physical Layer Security, Globecom'11, Houston, Texas,
Scientific paper
We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.
Chen Fangzhou
Gungor Onur
Koksal Can Emre
No associations
LandOfFree
Secret Key Generation From Mobility does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Secret Key Generation From Mobility, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secret Key Generation From Mobility will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-485761