Random Pilot Activation and Interpolated Channel Estimation for Physical-Layer Secret Key Generation in Correlated Eavesdropping Channel

被引:0
|
作者
Kojima, Shun [1 ]
Sugiura, Shinya [1 ]
机构
[1] Univ Tokyo, Inst Ind Sci, Tokyo 1538505, Japan
关键词
Eavesdropping; Channel estimation; Symbols; Interpolation; Correlation; Transmitters; Quantization (signal); Channel interpolation; correlated channel; eavesdropping channel; physical layer security; pilot reduction; secrecy capacity; secret key generation; WIRELESS NETWORKS; INFORMATION; SCHEME;
D O I
10.1109/TVT.2024.3386597
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a novel physical-layer secret key generation (SKG) scheme, which is based on reduced random pilot selection at a legitimate transmitter and channel interpolation at a legitimate receiver. As a result, the proposed scheme is capable of reducing pilot overhead and increasing secret key capacity (SKC) while suppressing information leakage to an eavesdropper in a correlated eavesdropping channel. More specifically, a subset of full pilot sequence is activated based on the legitimate channels at the legitimate transmitter, and the full channel coefficients are estimated from the received pilot symbol subset at the legitimate receiver with the aid of our channel interpolation. Additionally, despite the non-reciprocal channel due to the presence of a Doppler shift and an additive noise, our scheme achieves high SKG reliability in comparison to that without our reduced pilot selection or channel interpolation. We also derive the theoretical SKC for the proposed scheme. Our simulation results demonstrate that the proposed SKG scheme exhibits a higher performance in terms of both the SKC and key disagreement ratio.
引用
收藏
页码:12978 / 12990
页数:13
相关论文
共 50 条
  • [1] Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels
    Xu, Peng
    Yang, Jun
    Chen, Gaojie
    Yang, Zheng
    Li, Yong
    Win, Moe Z.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 985 - 1000
  • [2] Physical Layer Key Generation Scheme Through Scrambling the Correlated Eavesdropping Channel
    Chen, Yajun
    Huang, Kaizhi
    Zhou, You
    Ma, Keming
    Jin, Henglei
    Xu, Xiaoming
    IEEE ACCESS, 2020, 8 : 48982 - 48990
  • [3] On Channel Transforms to Enhance Reciprocity and Quantization in Physical-Layer Secret Key Generation
    Hussain, Ghalib
    Junaid Nawaz, Syed
    Wyne, Shurjeel
    Patwary, Mohammad N.
    IEEE ACCESS, 2025, 13 : 256 - 272
  • [4] A Two-Layer Secure Quantization Algorithm for Secret Key Generation With Correlated Eavesdropping Channel
    Jin, Henglei
    Huang, Kaizhi
    Xiao, Shuaifang
    Lou, Yangming
    Xu, Xiaoming
    Chen, Yajun
    IEEE ACCESS, 2019, 7 : 26480 - 26487
  • [5] Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel
    Shixun GONG
    Xiaofeng TAO
    Na LI
    Haowei WANG
    Jin XU
    Science China(Information Sciences), 2022, 65 (09) : 273 - 285
  • [6] Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel
    Shixun Gong
    Xiaofeng Tao
    Na Li
    Haowei Wang
    Jin Xu
    Science China Information Sciences, 2022, 65
  • [7] Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
    Chou, Tzu-Han
    Draper, Stark C.
    Sayeed, Akbar M.
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2518 - 2522
  • [8] Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel
    Gong, Shixun
    Tao, Xiaofeng
    Li, Na
    Wang, Haowei
    Xu, Jin
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (09)
  • [9] Achievable Rates for Physical-Layer Cooperative Key Generation with Correlated Eavesdropping Channels
    Xu, Peng
    Yang, Jun
    Chen, Gaojie
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [10] Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase
    Cheng, Longwang
    Zhou, Li
    Seet, Boon-Chong
    Li, Wei
    Ma, Dongtang
    Wei, Jibo
    MOBILE INFORMATION SYSTEMS, 2017, 2017