Strong Secrecy for Wireless Channels (Invited Talk)
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Distributed detection with censoring sensors under physical layer secrecy
IEEE Transactions on Signal Processing
Authentication over noisy channels
IEEE Transactions on Information Theory
Wireless physical-layer security: the case of colluding eavesdroppers
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
On the delay limited secrecy capacity of fading channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Tandem coding and cryptography on wiretap channels: EXIT chart analysis
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Relay selection for secure cooperative networks with jamming
IEEE Transactions on Wireless Communications
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secret sharing over fast-fading MIMO wiretap channels
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Improving wireless physical layer security via cooperating relays
IEEE Transactions on Signal Processing
A note on information-theoretic secret key exchange over wireless channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Secrecy extraction from increased randomness in a time-variant MIMO channel
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure joint source-channel coding for quasi-static fading channels
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A novel framework for message authentication in vehicular communication networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secure physical layer key generation schemes: performance and information theoretic limits
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Ergodic secrecy capacity region of the fading broadcast channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Physical-layer security: combining error control coding and cryptography
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure transmission with multiple antennas I: the MISOME wiretap channel
IEEE Transactions on Information Theory
Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
On multiuser secrecy rate in flat fading channel
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Secret sharing in fast fading channels using obfuscated incremental-redundancy hybrid ARQ
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis
IEEE Transactions on Information Forensics and Security
Exploiting the physical layer for enhanced security
IEEE Wireless Communications
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Vulnerabilities of wireless key exchange based on channel reciprocity
WISA'10 Proceedings of the 11th international conference on Information security applications
Secret keys from channel noise
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Common randomness and secret key capacities of two-way channels
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Achievable secrecy rates for wiretap OFDM with QAM constellations
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Leakage-probability-constrained secrecy capacity of a fading channel
Security and Communication Networks
Security and privacy issues for the network of the future
Security and Communication Networks
Limitations of generating a secret key using wireless fading under active adversary
IEEE/ACM Transactions on Networking (TON)
Low-power secret-key agreement over OFDM
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Control of wireless networks with secrecy
IEEE/ACM Transactions on Networking (TON)
Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal
A New Relay and Jammer Selection Schemes for Secure One-Way Cooperative Networks
Wireless Personal Communications: An International Journal
Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 754.96 |
This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.