Corpus ID: 14147792

The Effect of Eavesdropper's Statistics in Experimental Wireless Secret-Key Generation

@article{Pierrot2013TheEO,
  title={The Effect of Eavesdropper's Statistics in Experimental Wireless Secret-Key Generation},
  author={Alexandre J. Pierrot and R'emi A. Chou and Matthieu R. Bloch},
  journal={arXiv: Information Theory},
  year={2013}
}
  • Alexandre J. Pierrot, R'emi A. Chou, Matthieu R. Bloch
  • Published 2013
  • Computer Science, Mathematics
  • arXiv: Information Theory
  • This paper investigates the role of the eavesdropper's statistics in the implementation of a practical secret-key generation system. We carefully conduct the information-theoretic analysis of a secret-key generation system from wireless channel gains measured with software-defined radios. In particular, we show that it is inaccurate to assume that the eavesdropper gets no information because of decorrelation with distance. We also provide a bound for the achievable secret-key rate in the finite… CONTINUE READING

    Figures, Tables, and Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 13 CITATIONS

    Physical-Layer Secret Key Generation with Correlated Eavesdropping Channel

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Secret-Key Generation: Full-Duplex Versus Half-Duplex Probing

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Performance of lattice coset codes on Universal Software Radio Peripherals

    VIEW 1 EXCERPT
    CITES METHODS

    A USRP implementation of wiretap lattice codes

    VIEW 1 EXCERPT
    CITES BACKGROUND

    Group Secret-Key Generation using Algebraic Rings in Three-User Wireless Networks

    VIEW 1 EXCERPT
    CITES BACKGROUND

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 46 REFERENCES

    Secret-key generation with arbitrarily varying eavesdropper's channel

    VIEW 1 EXCERPT

    Providing secrecy when the eavesdropper channel is arbitrarily varying: A case for multiple antennas

    • Xiang He, Aylin Yener
    • Computer Science
    • 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
    • 2010
    VIEW 1 EXCERPT

    Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

    • Jon W. Wallace
    • Computer Science
    • 2009 IEEE International Conference on Communications
    • 2009

    Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis

    VIEW 1 EXCERPT