Wireless Information-Theoretic Security - Part II: Practical Implementation

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

25 pages, 11 figures, submitted to Special Issue of IEEE Trans. on Info. Theory on Information Theoretic Security

Scientific paper

In Part I of this two-part paper on confidential communication over wireless channels, we studied the fundamental security limits of quasi-static fading channels from the point of view of outage secrecy capacity with perfect and imperfect channel state information. In Part II, we develop a practical secret key agreement protocol for Gaussian and quasi-static fading wiretap channels. The protocol uses a four-step procedure to secure communications: establish common randomness via an opportunistic transmission, perform message reconciliation, establish a common key via privacy amplification, and use of the key. We introduce a new reconciliation procedure that uses multilevel coding and optimized low density parity check codes which in some cases comes close to achieving the secrecy capacity limits established in Part I. Finally, we develop new metrics for assessing average secure key generation rates and show that our protocol is effective in secure key renewal.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Wireless Information-Theoretic Security - Part II: Practical Implementation does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Wireless Information-Theoretic Security - Part II: Practical Implementation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Wireless Information-Theoretic Security - Part II: Practical Implementation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-540007

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.