Abstract

We study secret key generation from reciprocal multipath wireless channels modeled as multiple parallel fading channels. We consider two channel characteristics that heavily impact secret key capacity: channel sparsity and correlation between main and eavesdropper's channels. We propose a joint model to capture the channel sparsity and correlated eavesdropping. For the case without eavesdroppers, we show that at each transmitter SNR γ there is an optimal sparsity 0 ≤ ρ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">opt</sub> ≤ 1, which specifies the fraction of non-zero channel coefficients, that yields the maximum secret key capacity. The reduction in secret key capacity due to eavesdropping is due to two sources. First is the overlap between the main and eavesdropper channels, i.e., the pattern of non-zero subchannels common to both. The second is the correlation between the channel coefficients of the overlapping channels. We show that when the power of the training signal is uniformly distributed over the non-zero channels, there is a cutoff SNR γ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">c</sub> below which the secret key rate is zero, but non-zero (and increasing in γ) when γ > γ <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">c</sub> . We also show that in the low SNR regime, the optimal input signal is peaky (a non-uniform training signal) by which the secret key capacity is non-zero at all γ > 0.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.