Key agreement over wireless fading channels with an active attacker

Lifeng Lai, Yingbin Liang, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

The problem of establishing a key over a wireless fading channel in the presence of an active attacker is considered. A key agreement protocol that combines the existing source model approach and channel model approach is adopted. First, the attacker's optimal attack strategy for this protocol is characterized. Then, the rate of the key that can be generated under this attack strategy is quantified. It is shown that, unlike the corresponding situation in wireline communications, it is possible to establish a key in the presence of an active attacker in wireless fading channels.

Original languageEnglish (US)
Title of host publication2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
Pages1391-1396
Number of pages6
DOIs
StatePublished - Dec 1 2010
Event48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 - Monticello, IL, United States
Duration: Sep 29 2010Oct 1 2010

Other

Other48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010
CountryUnited States
CityMonticello, IL
Period9/29/1010/1/10

Fingerprint

Fading channels
Communication

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Networks and Communications

Cite this

Lai, L., Liang, Y., & Poor, H. V. (2010). Key agreement over wireless fading channels with an active attacker. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010 (pp. 1391-1396). [5707076] https://doi.org/10.1109/ALLERTON.2010.5707076
Lai, Lifeng ; Liang, Yingbin ; Poor, H. Vincent. / Key agreement over wireless fading channels with an active attacker. 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010. 2010. pp. 1391-1396
@inproceedings{92d6fb1d05094f258ad99352ce4e5de2,
title = "Key agreement over wireless fading channels with an active attacker",
abstract = "The problem of establishing a key over a wireless fading channel in the presence of an active attacker is considered. A key agreement protocol that combines the existing source model approach and channel model approach is adopted. First, the attacker's optimal attack strategy for this protocol is characterized. Then, the rate of the key that can be generated under this attack strategy is quantified. It is shown that, unlike the corresponding situation in wireline communications, it is possible to establish a key in the presence of an active attacker in wireless fading channels.",
author = "Lifeng Lai and Yingbin Liang and Poor, {H. Vincent}",
year = "2010",
month = "12",
day = "1",
doi = "https://doi.org/10.1109/ALLERTON.2010.5707076",
language = "English (US)",
isbn = "9781424482146",
pages = "1391--1396",
booktitle = "2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010",

}

Lai, L, Liang, Y & Poor, HV 2010, Key agreement over wireless fading channels with an active attacker. in 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010., 5707076, pp. 1391-1396, 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010, Monticello, IL, United States, 9/29/10. https://doi.org/10.1109/ALLERTON.2010.5707076

Key agreement over wireless fading channels with an active attacker. / Lai, Lifeng; Liang, Yingbin; Poor, H. Vincent.

2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010. 2010. p. 1391-1396 5707076.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Key agreement over wireless fading channels with an active attacker

AU - Lai, Lifeng

AU - Liang, Yingbin

AU - Poor, H. Vincent

PY - 2010/12/1

Y1 - 2010/12/1

N2 - The problem of establishing a key over a wireless fading channel in the presence of an active attacker is considered. A key agreement protocol that combines the existing source model approach and channel model approach is adopted. First, the attacker's optimal attack strategy for this protocol is characterized. Then, the rate of the key that can be generated under this attack strategy is quantified. It is shown that, unlike the corresponding situation in wireline communications, it is possible to establish a key in the presence of an active attacker in wireless fading channels.

AB - The problem of establishing a key over a wireless fading channel in the presence of an active attacker is considered. A key agreement protocol that combines the existing source model approach and channel model approach is adopted. First, the attacker's optimal attack strategy for this protocol is characterized. Then, the rate of the key that can be generated under this attack strategy is quantified. It is shown that, unlike the corresponding situation in wireline communications, it is possible to establish a key in the presence of an active attacker in wireless fading channels.

UR - http://www.scopus.com/inward/record.url?scp=79952401767&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79952401767&partnerID=8YFLogxK

U2 - https://doi.org/10.1109/ALLERTON.2010.5707076

DO - https://doi.org/10.1109/ALLERTON.2010.5707076

M3 - Conference contribution

SN - 9781424482146

SP - 1391

EP - 1396

BT - 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010

ER -

Lai L, Liang Y, Poor HV. Key agreement over wireless fading channels with an active attacker. In 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010. 2010. p. 1391-1396. 5707076 https://doi.org/10.1109/ALLERTON.2010.5707076