A remark on secret-key generation over correlated fading channels

We study secret-key agreement with public discussion over a flat-fading wiretap channel model. The fading gains are correlated across the receivers and sampled independently at each time. Perfect receiver channel state information (CSI) is assumed, whereas a noisy CSI of the main channel is also available to the transmitter. We propose lower and upper bounds on the capacity. Our lower bound is achieved by a coding scheme that involves a separate binning of the receiver CSI sequence and its channel output sequence. In general it improves upon the joint-binning schemes considered in earlier works. Our upper and lower bounds coincide, establishing the capacity, when either the transmitter has no CSI or when the channel gains of the legitimate receiver and the eavesdropper are statistically independent.

[1]  Sang-Bin Rhee,et al.  Results of Suburban Base Station Spatial Diversity Measurements in the UHF Band , 1974, IEEE Trans. Commun..

[2]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[3]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[4]  Suhas N. Diggavi,et al.  Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.

[5]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..

[6]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[7]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[8]  G. Caire,et al.  On the capacity of some channels with channel state information , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[9]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[10]  Mohamed-Slim Alouini,et al.  Noncoherent Capacity of Secret-Key Agreement With Public Discussion , 2011, IEEE Transactions on Information Forensics and Security.

[11]  W.C.-Y. Lee Effects on Correlation Between Two Mobile Radio Base-Station Antennas , 1973, IEEE Trans. Commun..

[12]  Ashish Khisti Secret key agreement on wiretap channel with transmitter side information , 2010, 2010 European Wireless Conference (EW).

[13]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[14]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[15]  Matthieu Bloch,et al.  Secret Sharing over Fast-Fading MIMO Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..

[16]  Alex Reznik,et al.  Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.

[17]  Gregory W. Wornell,et al.  Secure Broadcasting , 2007, ArXiv.

[18]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.