Abstract
The analysis of secret key capacity is an important investigation on the design of secret key agreement protocol. In this paper, we characterize the secret key capacity based on received signal envelopes obeying Nakagami-m distribution between two legitimate users, in the presence of a passive eavesdropper, when the eavesdropping channel is correlated with the legitimate channel. The expression of secret key capacity is derived based on mutual information and applies to both integer and non-integer m. Simulation results indicate that the secret key capacity is proportional to m-fading parameter and average signal-to-noise ratio (SNR) and inversely proportional to the number of paths. In addition, some behaviors of secret key capacity over a high mobility fading channel, and microcell and macrocell environments are provided. These results cover the performance of secret key capacity when the received signal envelope follows Rayleigh, Rician, and Gaussian distributions.
Similar content being viewed by others
References
Khan R, Kumar P, Jayakody D N K, et al. A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun Surv Tut, 2020, 22: 196–248
Cao J, Ma M D, Li H, et al. A survey on security aspects for 3GPP 5G networks. IEEE Commun Surv Tut, 2020, 22: 170–195
Wang N, Wang P, Alipour-Fanid A, et al. Physical-layer security of 5G wireless networks for IoT: challenges and opportunities. IEEE Internet Things J, 2019, 6: 8169–8181
Li N, Xia S D, Tao X F, et al. An area based physical layer authentication framework to detect spoofing attacks. Sci China Inf Sci, 2020, 63: 222302
Chen H, Tao X F, Li N, et al. A data analysis of political polarization using random matrix theory. Sci China Inf Sci, 2020, 63: 129303
Zhong B, Zhang Z S. Secure full-duplex two-way relaying networks with optimal relay selection. IEEE Commun Lett, 2017, 21: 1123–1126
Zhong B, Chen L, Tang Z J. Ergodic rate analysis for full-duplex NOMA networks with energy harvesting. Sci China Inf Sci, 2021, 64: 189303
Jiao L, Wang N, Wang P, et al. Physical layer key generation in 5G wireless networks. IEEE Wirel Commun, 2019, 26: 48–54
Qin D R, Ding Z. Exploiting multi-antenna non-reciprocal channels for shared secret key generation. IEEE Trans Inform Forensic Secur, 2016, 11: 2693–2705
Xu P, Cumanan K, Ding Z G, et al. Group secret key generation in wireless networks: algorithms and rate optimization. IEEE Trans Inform Forensic Secur, 2016, 11: 1831–1846
Gong S X, Tao X F, Li N, et al. Secure secret key and private key generation in source-type model with a trusted helper. IEEE Access, 2020, 8: 34611–34628
Tavangaran N, Boche H, Schaefer R. Secret-key generation using compound sources and one-way public communication. IEEE Trans Inform Forensic Secur, 2017, 12: 227–241
Tavangaran N, Schaefer R F, Poor H V, et al. Secret-key generation and convexity of the rate region using infinite compound sources. IEEE Trans Inform Forensic Secur, 2018, 13: 2075–2086
Lai L F, Liang Y B, Du W L. Cooperative key generation in wireless networks. IEEE J Sel Areas Commun, 2012, 30: 1578–1588
Zeng K. Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun Mag, 2015, 53: 33–39
Aldaghri N, Mahdavifar H. Physical layer secret key generation in static environments. IEEE Trans Inform Forensic Secur, 2020, 15: 2692–2705
Pierrot A J, Chou R A, Bloch M R. The effect of eavesdropper’s statistics in experimental wireless secret-key generation. 2013. ArXiv:1312.3304
Chou T H, Draper S C, Sayeed A M. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness. In: Proceedings of IEEE International Symposium on Information Theory, Austin, 2010. 2518–2522
Zhang J Q, He B, Duong T Q, et al. On the key generation from correlated wireless channels. IEEE Commun Lett, 2017, 21: 961–964
Jin H L, Huang K Z, Xiao S F, et al. A two-layer secure quantization algorithm for secret key generation with correlated eavesdropping channel. IEEE Access, 2019, 7: 26480–26487
Lai L F, Liang Y B, Poor H V. A unified framework for key agreement over wireless fading channels. IEEE Trans Inform Forensic Secur, 2012, 7: 480–490
Zheng Y R, Xiao C S. Improved models for the generation of multiple uncorrelated Rayleigh fading waveforms. IEEE Commun Lett, 2002, 6: 256–258
Reig J, Martinez-Amoraga M A, Rubio L. Generation of bivariate Nakagami-m fading envelopes with arbitrary not necessary identical fading parameters. Wirel Commun Mob Comput, 2007, 7: 531–537
Wal J W, Sharma R K. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis. IEEE Trans Inform Forensic Secur, 2010, 5: 381–392
Nakagami M. The m-distribution — a general formula of intensity distribution of rapid fading. In: Statistical Methods in Radio Wave Propagation. Elmsford: Pergamon Press, 1960
Gradshteyn I S, Ryzhik I M. Table of Integrals, Series, and Products. 6th ed. Orlando: Academic Press, 2000
Bloch M, Barros J. Physical-Layer Security: from Information Theory to Security Engineering. Cambridge: Cambridge University Press, 2011
Gamal A E, Kim Y H. Network Information Theory. Cambridge: Cambridge University Press, 2011
Yip K W, Ng T S. A simulation model for Nakagami-m fading channels, m < 1. IEEE Trans Commun, 2000, 48: 214–221
Szabo Z. Information theoretical estimators toolbox. J Mach Learn Res, 2014, 15: 283–287
Braun W R, Dersch U. A physical mobile radio channel model. IEEE Trans Veh Technol, 1991, 40: 472–482
Cover T M, Thomas J A. Elements of Information Theory. 2nd ed. Hoboken: Wiley, 2006
Ribouh S, Malawade A V, Elhillali Y, et al. Channel state information-based cryptographic key generation for intelligent transportation systems. IEEE Trans Int Trans Syst, 2021, 22: 7496–7507
Azam M I. Impact of variability of Nakagami-m parameter on the performance of digital communication systems. 2006. http://eprints.kfupm.edu.sa/9763/1/9763.pdf
Reig J, Rubio L, Cardona N. Bivariate Nakagami-m distribution with arbitrary fading parameters. Electron Lett, 2002, 38: 1715–1717
Acknowledgements
This work was supported in part by National Key R&D Program of China (Grant No. 2019YFE0114000), in part by National Natural Science Foundation of China (Grant Nos. 61932005, 62071066), in part by Shenzhen Science and Technology Innovation Commission Free Exploring Basic Research Project (Grant Nos. 2021Szvup008, JCYJ20170307172830043), in part by National High-tech R&D Program of China (Grant No. 2014AA01A701), in part by 111 Project of China (Grant No. B16006), and in part by Fundamental Research Funds for the Central Universities (Grant No. 2020RC39).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gong, S., Tao, X., Li, N. et al. Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel. Sci. China Inf. Sci. 65, 192304 (2022). https://doi.org/10.1007/s11432-021-3353-5
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-021-3353-5