2013
DOI: 10.1109/jsac.2013.130919
|View full text |Cite
|
Sign up to set email alerts
|

Intrinsic Information of Wideband Channels

Abstract: Abstract-The ability to exchange secret messages and protect against security attacks becomes increasingly important for providing information superiority and confidentiality in modern information systems. These systems require shared secret keys, which can be generated from common random sources with known distributions. However, the assumption on the distribution of the sources may not hold in many realistic scenarios. In this paper, we establish a mathematical framework for secret-key generation using commo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 48 publications
0
12
0
Order By: Relevance
“…For a given and , the secrecy throughput of the legitimate link associated with the th transmitter, conditioned on , is given by (30) Similar to the conditional network secrecy rate defined in Section III-B, the conditional network secrecy throughput originated from the legitimate nodes in a bounded set is defined as (31) Then, the network secrecy throughput density is given by (32) which results in (33) In (33), is the average secrecy throughput of a typical link in the network with the legitimate transmitter placed in the origin. Specifically, we can write 18 (34) The evaluation of network secrecy metrics, given by (20), (24), and (33), requires the statistical characterization of and , whose CDF and PDF are derived in the following.…”
Section: E Network Secrecy Throughput Densitymentioning
confidence: 99%
See 3 more Smart Citations
“…For a given and , the secrecy throughput of the legitimate link associated with the th transmitter, conditioned on , is given by (30) Similar to the conditional network secrecy rate defined in Section III-B, the conditional network secrecy throughput originated from the legitimate nodes in a bounded set is defined as (31) Then, the network secrecy throughput density is given by (32) which results in (33) In (33), is the average secrecy throughput of a typical link in the network with the legitimate transmitter placed in the origin. Specifically, we can write 18 (34) The evaluation of network secrecy metrics, given by (20), (24), and (33), requires the statistical characterization of and , whose CDF and PDF are derived in the following.…”
Section: E Network Secrecy Throughput Densitymentioning
confidence: 99%
“…and follow a uniform distribution in . Therefore, the CDF of becomes (55) Letting , the CDF of the maximum SIR becomes (56) Using (56) together with the results in Section V, the network secrecy rate density (20), the network secrecy rate outage density (24), and the network secrecy throughput density (33) are obtained for the case of NERN strategy.…”
Section: A Nearby Eavesdropping Region Neutralizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Secret-key generation at the physical-layer using common sources, such as reciprocal wireless channels, has been investigated in [26]- [30]. In addition, secrecy in clustered or multi-hop networks has been investigated in [31]- [33].…”
Section: Introductionmentioning
confidence: 99%