Journal on Communications ›› 2016, Vol. 37 ›› Issue (9): 75-81.doi: 10.11959/j.issn.1000-436x.2016177
• Papers • Previous Articles Next Articles
Xu WANG,Liang JIN(),Lu LIU,Ming-liang LI,Kai-zhi HUANG
Online:
2016-09-25
Published:
2016-09-28
Supported by:
Xu WANG,Liang JIN,Lu LIU,Ming-liang LI,Kai-zhi HUANG. Analysis of physical layer secret key capacity in the uniform scattering environment[J]. Journal on Communications, 2016, 37(9): 75-81.
[1] | SHEHADEH Y E H , HOGREFE D . A survey on secret key generation mechanisms on the physical layer in wireless networks[J]. Security and Communication Networks, 2015,8(2): 332-41. |
[2] | WANG T , LIU Y , VASILAKOS A V . Survey on channel reciprocity based key establishment techniques for wireless systems[J]. Wireless Networks, 2015,21(6): 1835-46. |
[3] | THAI C D T , LEE J , QUEK T Q . Physical-layer secret key generation with colluding untrusted relays[J]. IEEE Transactions on Wireless Communications, 2016,15(2): 1517-30. |
[4] | CHOU T H , DRAPER S C , SAYEED A M . Key generation using external source excitation:capacity,reliability,and secrecy exponent[J]. IEEE Transactions on Information Theory, 2012,58(4): 2455-74. |
[5] | PFENNIG S , FRANZ E , ENGELMANN S ,et al. End-to-end key establishment with physical layer key generation and specific attacker models[M]. Physical and Data-Link Security Techniques for Future Communication Systems. Springer, 2016: 93-110. |
[6] | PREMNATH S N , JANA S , CROFT J ,et al. Secret key extraction from wireless signal strength in real environments[J]. IEEE Transactions on Mobile Computing, 2013,12(5): 917-30. |
[7] | TSOURI G R , WAGNER D M . Threshold constraints on symmetric key extraction from rician fading estimates[J]. IEEE Transactions on Mobile Computing, 2013,12(12): 2496-506. |
[8] | 戴峤, 宋华伟, 金梁 . 基于等效信道的物理层认证和密钥分发机制[J]. 中国科学 信息科学, 2014,44(12): 1580-92. DAI Q , SONG H W , JIN L ,et al. Physical–layer authentication and key distribution mechanism based on equivalent channel[J]. Scientia Sinica Informationis, 2014,44(12): 1580-1592. |
[9] | MAURER U M . Secret key agreement by public discussion from common information[J]. IEEE Transactions on Information Theory, 1993,39(3): 733-42. |
[10] | AHLSWEDE R,CSISZáR I.Common randomness in information theory and cryptography . part I:secret sharing[J]. IEEE Transactions on Information Theory, 1993,39(4): 1121-32. |
[11] | AHLSWEDE R,CSISZáR I . Common randomness in information theory and cryptography part II:CR capacity[J]. IEEE Transactions on Information Theory, 1998,44(1): 225-40. |
[12] | PATWARI N , CROFT J , JANA S ,et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J]. IEEE Transactions on Mobile Computing, 2010,9(1): 17-30. |
[13] | SHEHADEH Y E H , ALFANDI O , HOGREFE D . On improving the robustness of physical-layer key extraction mechanisms against delay and mobility[C]// IEEE Wireless Communications and Mobile Computing Conference. Limassol,Cyprus, 2012: 1028-1033. |
[14] | SHEHADEH Y E H , ALFANDI O , HOGREFE D . Towards robust key extraction from multipath wireless channels[J]. Journal of Communications and Networks, 2012,4(14): 385-95. |
[15] | NITINAWARAT S , NARAYAN P . Secret key generation for correlated Gaussian sources[J]. IEEE Transactions on Information Theory, 2012,58(6): 3373-3391. |
[16] | WU X , SONG Y , ZHAO C ,et al. Secrecy extraction from correlated fading channels:an upper bound[C]// IEEE International Conference on Wireless Communications & Signal Processing. Nanjing,China, 2009. |
[17] | CLARKE R . A statistical theory of mobile‐radio reception[J]. Bell System Technical Journal, 1968,47(6): 957-1000. |
[18] | JAKES W C , COX D C . Microwave mobile communications[M]. New Jersey,USA: Wiley-IEEE PressPress, 1994. |
[19] | GOLD S A . Wireless communications[M]. Cambridge,UK: Cambridge University PressPress, 2005. |
[20] | CHEN C , JENSEN M . Secret key establishment using temporally and spatially correlated wireless channel coefficients[J]. IEEE Transactions on Mobile Computing, 2011,10(2): 205-215. |
[21] | COVER T M , THOMAS J A . Elements of information theory[M]. New Jersey,USA: John Wiley & SonsPress, 2012. |
[22] | FONTáN F P , ESPI?EIRA P M . Modelling the wireless propagation channel:a simulation approach with matlab[M]. New Jersey,USA: John Wiley & SonsPress, 2008. |
[23] | ZENG X , DURRANI T . Estimation of mutual information using copula density function[J]. Electronics Letters, 2011,47(8): 493-494. |
[24] | MA J , SUN Z . Mutual information is copula entropy[J]. Tsinghua Science & Technology, 2011,16(1): 51-4. |
[25] | 韩敏, 刘晓欣 . 基于Copula熵的互信息估计方法[J]. 控制理论与应用, 2013,30(7): 875-879. HAN M , LIU X X . Mutual information estimation based on copula entropy[J]. Control Theory & Applications, 2013,30(7): 875-879. |
[1] | Yu ZHANG, Xiongwen ZHAO, Xiaoqing WANG, Suiyan GENG, Peng QIN, Zhenyu ZHOU. Robust resource allocation algorithm for multicarrier NOMA security communication system [J]. Journal on Communications, 2022, 43(3): 42-52. |
[2] | Hancheng LU, Yazheng WANG, Dan ZHAO, Tao LUO, Jun WU. Survey of physical layer security of intelligent reflecting surface-assisted wireless communication systems [J]. Journal on Communications, 2022, 43(2): 171-184. |
[3] | Xiaorong JING, Zhenyuan SONG, Wei GAO, Weijia LEI, Qianbin CHEN. Design scheme of physical layer security for intelligent reflecting surface-assisted MISO communication system [J]. Journal on Communications, 2022, 43(1): 117-126. |
[4] | Zan LI, Junfan HU, Bing LI, Jia SHI, Jiangbo SI. Secrecy analysis for orthogonal time frequency space technique based LEO satellite communication [J]. Journal on Communications, 2021, 42(8): 25-32. |
[5] | Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG. Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption [J]. Journal on Communications, 2021, 42(5): 51-62. |
[6] | Pinyi REN,Qian XU. Delay and energy minimization for MEC-based secure communication [J]. Journal on Communications, 2020, 41(11): 52-63. |
[7] | Weijia LEI,Yang ZHOU,Xianzhong XIE,Hongjiang LEI. Design of precoding matrices in MIMO full duplex two-way security communication system [J]. Journal on Communications, 2020, 41(10): 156-171. |
[8] | DENG Hao,WANG Huiming. Research on critical SNR and power allocation of artificial noise assisted secure transmission [J]. Journal on Communications, 2019, 40(6): 66-73. |
[9] | Zhou ZHONG,Bo ZHANG,Xiaohui QI,Kaizhi HUANG. Physical layer security performance analysis of multi-antenna full-duplex relay aided heterogeneous cellular network [J]. Journal on Communications, 2019, 40(5): 24-31. |
[10] | Bo ZHANG,Kaizhi HUANG,Zhou ZHONG,Yajun CHEN. Artificial noise-aided robust secure information and power transmission scheme in heterogeneous networks with simultaneous wireless information and power transfer [J]. Journal on Communications, 2019, 40(3): 60-72. |
[11] | Keming MA,Yajun CHEN,Xin HU,Kaizhi HUANG,Xinsheng JI. Opportunistic secure transmission scheme for simultaneous wireless information and power transfer [J]. Journal on Communications, 2019, 40(2): 70-81. |
[12] | Wenbo GUO,Changqing SONG,Rong WEN,Hongzhi ZHAO,Youx TANG. Cooperative interference power allocation in physical layer security under imperfect time synchronization [J]. Journal on Communications, 2019, 40(11): 86-93. |
[13] | Wei WANG,Xinrui LI,Liuguo YIN,Guoan ZHANG,Shibing ZHANG. Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver [J]. Journal on Communications, 2019, 40(1): 110-118. |
[14] | WANG Wei, LI Xinrui, YIN Liuguo, ZHANG Guoan, ZHANG Shibing. Secure resource allocation in hybrid energy-harvesting relay and full-duplex receiver [J]. Journal on Communications, 2018, 99(99): 1-. |
[15] | Rui ZHAO,Xing TAN,Yuanjian LI,Yucheng HE,Chunguo LI. Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination [J]. Journal on Communications, 2018, 39(9): 20-30. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|