Title | Wireless Information-Theoretic Security |
Publication Type | Journal Article |
Year of Publication | 2008 |
Authors | Bloch, M., Barros, J., Rodrigues, M. R. D., McLaughlin, S. W. |
Journal | IEEE Transactions on Information Theory |
Volume | 54 |
Pagination | 2515–2534 |
Date Published | jun |
ISSN | 1557-9654 |
Keywords | average secure communication, channel coding, channel state information, Communication system security, data privacy, Data security, Fading, fading channels, Human Behavior, imperfect channel state information, Information analysis, Information security, information theoretic security, information-theoretic security, low-density parity-check (LDPC) codes, message protection, Metrics, multilevel coding, optimized low-density parity-check codes, outage probability, parity check codes, policy-based governance, privacy, Privacy Amplification, private key cryptography, probability, protection, pubcrawl, quasi static fading channel, Resiliency, Scalability, secrecy capacity, secret key agreement, secret key generation, secure communication protocol, telecommunication security, Wireless application protocol, wireless channel, wireless channels, Wireless Information-Theoretic Security |
Abstract | This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information. |
DOI | 10.1109/TIT.2008.921908 |
Citation Key | bloch_wireless_2008 |