Secret Key Generation in the Two-Way Relay Channel With Active Attackers

  title={Secret Key Generation in the Two-Way Relay Channel With Active Attackers},
  author={Heng Zhou and Lauren M. Huie and Lifeng Lai},
  journal={IEEE Transactions on Information Forensics and Security},
Most of the existing work on key generation from wireless fading channels requires a direct wireless link between legitimate users so that they can obtain correlated observations from the common wireless link. This paper studies the key generation problem in the two-way relay channel, in which there is no direct channel between the key generating terminals. We propose an effective key generation scheme that achieves a substantially larger key rate than that of a direct channel mimic approach… CONTINUE READING
Highly Cited
This paper has 54 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 24 extracted citations

Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization

IEEE Transactions on Information Forensics and Security • 2016
View 9 Excerpts
Highly Influenced

On the Private Key Capacity of the $M$ -Relay Pairwise Independent Network

IEEE Transactions on Information Theory • 2016
View 4 Excerpts
Highly Influenced

The private key capacity of a cooperative pairwise-independent network

2015 IEEE International Symposium on Information Theory (ISIT) • 2015
View 5 Excerpts
Highly Influenced

Physical-layer secret key generation with untrusted relays

2014 IEEE Globecom Workshops (GC Wkshps) • 2014
View 4 Excerpts
Highly Influenced

RASI: Relay-Assisted Physical-Layer Key Generation in Unmanned Aerial Vehicles

2018 IEEE 87th Vehicular Technology Conference (VTC Spring) • 2018
View 1 Excerpt

Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks

2017 IEEE Wireless Communications and Networking Conference (WCNC) • 2017
View 1 Excerpt

54 Citations

Citations per Year
Semantic Scholar estimates that this publication has 54 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 22 references

Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems

IEEE Transactions on Information Forensics and Security • 2011
View 6 Excerpts
Highly Influenced

Csiszàr, “Common randomness in information theory and cryptography—Part I: Secret sharing,

I. R. Ahlswede
IEEE Trans. Inf. Theory, vol. 39, • 1993
View 7 Excerpts
Highly Influenced

Fundamentals of Wireless Communication

View 3 Excerpts
Highly Influenced

Key generation in two-way relay wireless channels

2013 47th Annual Conference on Information Sciences and Systems (CISS) • 2013

and P

A. Kraskov, H. Stögbauer
Grassberger, “Estimating mutual information,” Phys. Rev. E, vol. 69, p. 066138, Jun. 2004. Heng Zhou received the B.E. degree from the Huazhong University of Science and Technology and the M.E. degree from the Nanjing University of Posts and Telecommunications. His research interests include informa • 2013
View 1 Excerpt

Cooperative Key Generation in Wireless Networks

IEEE Journal on Selected Areas in Communications • 2012
View 2 Excerpts

Interactive secret key generation over reciprocal fading channels

2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton) • 2012
View 1 Excerpt

Similar Papers

Loading similar papers…