DocumentCode :
2423210
Title :
Key agreement over wireless fading channels with an active attacker
Author :
Lai, Lifeng ; Liang, Yingbin ; Poor, H. Vincent
Author_Institution :
Dept. of Syst. Eng., Univ. of Arkansas, Little Rock, AR, USA
fYear :
2010
fDate :
Sept. 29 2010-Oct. 1 2010
Firstpage :
1391
Lastpage :
1396
Abstract :
The problem of establishing a key over a wireless fading channel in the presence of an active attacker is considered. A key agreement protocol that combines the existing source model approach and channel model approach is adopted. First, the attacker´s optimal attack strategy for this protocol is characterized. Then, the rate of the key that can be generated under this attack strategy is quantified. It is shown that, unlike the corresponding situation in wireline communications, it is possible to establish a key in the presence of an active attacker in wireless fading channels.
Keywords :
cryptographic protocols; fading channels; active attacker; key agreement protocol; optimal attack strategy; wireless fading channel; Channel estimation; Communication system security; Fading; Protocols; Random variables; Training; Wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication, Control, and Computing (Allerton), 2010 48th Annual Allerton Conference on
Conference_Location :
Allerton, IL
Print_ISBN :
978-1-4244-8215-3
Type :
conf
DOI :
10.1109/ALLERTON.2010.5707076
Filename :
5707076
Link To Document :
بازگشت