Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks

Long-term evolution-advanced (LTE-A) networks exploit low-power relay nodes, picocells and femtocells to boost throughput, enhance coverage, decrease latency, and reduce cost. End users in a relay-based LTE-A network can recruit relay nodes to cooperate as virtual antenna arrays, thereby reaping the benefits offered by multiple input single output (MIMO) techniques. Although the relay-based cooperative MIMO (coop MIMO) implementation in LTE-A networks improves performance, security issues are often overlooked. This paper introduces a physical layer security scheme for point-to-point networks, and extends this scheme to MIMO networks. Two practical relay-based coop MIMO architectures and corresponding secret key generation (SKG) schemes are presented. For both the MIMO and coop MIMO networks, the impact of proposed power allocation on SKG rate (SKGR) is quantified via the theoretical and numerical analysis. Results indicate that the proposed power allocation scheme can offer 15%-30% increase in SKGR relative to MIMO/coop MIMO networks with equal power allocation at low-power region, thereby improving network security.

[1]  Yue Rong,et al.  Optimality of diagonalization of multi-hop MIMO relays , 2009, IEEE Transactions on Wireless Communications.

[2]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  Heng Zhou,et al.  Secret Key Generation in the Two-Way Relay Channel With Active Attackers , 2014, IEEE Transactions on Information Forensics and Security.

[4]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Yingbo Hua,et al.  Joint Source and Relay Optimization for a Non-Regenerative MIMO Relay , 2006, Fourth IEEE Workshop on Sensor Array and Multichannel Processing, 2006..

[7]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[9]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[10]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[11]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[12]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[13]  Amitava Ghosh,et al.  Multi-Antenna Systems for LTE eNodeB , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.

[14]  Satoshi Nagata,et al.  MIMO and CoMP in LTE-Advanced , 2010 .

[15]  Balasubramaniam Natarajan,et al.  MIMO-Based Secret Key Generation Strategies: Rate Analysis , 2014, Int. J. Mob. Comput. Multim. Commun..

[16]  Wenliang Du,et al.  PHY-based cooperative key generation in wireless networks , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[18]  Michael A. Jensen,et al.  Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.

[19]  M. Debbah,et al.  Wireless physical-layer security: The challenges ahead , 2009, 2009 International Conference on Advanced Technologies for Communications.

[20]  Wenliang Du,et al.  Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.

[21]  Armin Wittneben,et al.  Power Allocation Schemes for Amplify-and-Forward MIMO-OFDM Relay Links , 2007, IEEE Transactions on Wireless Communications.

[22]  Alexandre J. Pierrot,et al.  Strongly Secure Communications Over the Two-Way Wiretap Channel , 2010, IEEE Transactions on Information Forensics and Security.

[23]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[24]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[25]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[26]  Xiang Cheng,et al.  Cooperative MIMO channel models: A survey , 2010, IEEE Communications Magazine.

[27]  John M. Cioffi,et al.  Uniform power allocation in MIMO channels: a game-theoretic approach , 2003, IEEE Transactions on Information Theory.

[28]  Balasubramaniam Natarajan,et al.  Relay-based secret key generation in LTE-A , 2014, 2014 IEEE Conference on Communications and Network Security.