Creating and sharing knowledge for telecommunications

Wireless Information Theoretic Security

Bloch, M.Bloch ; Barros, J. ; Rodrigues , M. ; McLaughlin, S.W.M.

Eurasip Journal on Wireless Communications and Networking Vol. 54, Nº 6, pp. 2515 - 2534, June, 2008.

ISSN (print):
ISSN (online): 1687-1499

Scimago Journal Ranking: 0,49 (in 2008)

Digital Object Identifier: 10.1155/2011/628747

Abstract
This paper considers the transmission of confidential
data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasistatic
fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a fourstep procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message
reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal—even in the presence of imperfect channel state information.