Key agreement over wireless fading channels with an active attacker

Lifeng Lai, Yingbin Liang, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

The problem of establishing a key over a wireless fading channel in the presence of an active attacker is considered. A key agreement protocol that combines the existing source model approach and channel model approach is adopted. First, the attacker's optimal attack strategy for this protocol is characterized. Then, the rate of the key that can be generated under this attack strategy is quantified. It is shown that, unlike the corresponding situation in wireline communications, it is possible to establish a key in the presence of an active attacker in wireless fading channels.

Original languageEnglish (US)
Title of host publication2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Pages1391-1396
Number of pages6
DOIs
StatePublished - Dec 1 2010
Event48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 - Monticello, IL, United States
Duration: Sep 29 2010Oct 1 2010

Publication series

Name2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010

Other

Other48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
CountryUnited States
CityMonticello, IL
Period9/29/1010/1/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'Key agreement over wireless fading channels with an active attacker'. Together they form a unique fingerprint.

Cite this