Wireless Information-Theoretic Security
Top Cited Papers
- 23 May 2008
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 54 (6) , 2515-2534
- https://doi.org/10.1109/tit.2008.921908
Abstract
This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.Keywords
This publication has 46 references indexed in Scilit:
- Secrecy Capacities for Multiple TerminalsIEEE Transactions on Information Theory, 2004
- Capacity of power constrained memoryless AWGN channels with fixed input constellationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Bit-interleaved coded modulationIEEE Transactions on Information Theory, 1998
- Linking information reconciliation and privacy amplificationJournal of Cryptology, 1997
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- The Gaussian wire-tap channelIEEE Transactions on Information Theory, 1978
- The Wire-Tap ChannelBell System Technical Journal, 1975
- Recent results in the Shannon theoryIEEE Transactions on Information Theory, 1974
- Noiseless coding of correlated information sourcesIEEE Transactions on Information Theory, 1973