DC Field | Value | Language |
---|---|---|
dc.contributor.author | Im, Sanghun | ko |
dc.contributor.author | Jeon, Hyoungsuk | ko |
dc.contributor.author | Choi, Jinho | ko |
dc.contributor.author | Ha, Jeongseok | ko |
dc.date.accessioned | 2016-04-22T07:48:35Z | - |
dc.date.available | 2016-04-22T07:48:35Z | - |
dc.date.created | 2015-10-28 | - |
dc.date.created | 2015-10-28 | - |
dc.date.issued | 2015-12 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.14, no.12, pp.6579 - 6594 | - |
dc.identifier.issn | 1536-1276 | - |
dc.identifier.uri | http://hdl.handle.net/10203/205722 | - |
dc.description.abstract | We present a secret key agreement (SKA) protocol for a multi-user time-division duplex system where a base-station (BS) with a large antenna array (LAA) shares secret keys with users in the presence of non-colluding eavesdroppers. In the system, when the BS transmits random sequences to legitimate users for sharing common randomness, the eavesdroppers can attempt the pilot contamination attack (PCA) in which each of eavesdroppers transmits its target user's training sequence in hopes of acquiring possible information leak by steering beam towards the eavesdropper. We show that there exists a crucial complementary relation between the received signal strengths at the eavesdropper and its target user. This relation tells us that the eavesdropper inevitably leaves a trace that enables us to devise a way of measuring the amount of information leakage to the eavesdropper even if PCA parameters are unknown. To this end, we derive an estimator for the channel gain from the BS to the eavesdropper and propose a rate-adaptation scheme for adjusting the length of secret key under the PCA. Extensive analysis and evaluations are carried out under various setups, which show that the proposed scheme adequately takes advantage of the LAA to establish the secret keys under the PCA. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | MARCUM Q-FUNCTION | - |
dc.subject | OUTAGE PROBABILITY | - |
dc.subject | WIRETAP CHANNELS | - |
dc.subject | MULTIUSER MIMO | - |
dc.subject | TDD SYSTEMS | - |
dc.subject | POLAR CODES | - |
dc.subject | INFORMATION | - |
dc.subject | WIRELESS | - |
dc.subject | CRYPTOGRAPHY | - |
dc.subject | SECURITY | - |
dc.title | Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack | - |
dc.type | Article | - |
dc.identifier.wosid | 000366848200006 | - |
dc.identifier.scopusid | 2-s2.0-84961594121 | - |
dc.type.rims | ART | - |
dc.citation.volume | 14 | - |
dc.citation.issue | 12 | - |
dc.citation.beginningpage | 6579 | - |
dc.citation.endingpage | 6594 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.identifier.doi | 10.1109/TWC.2015.2456894 | - |
dc.contributor.localauthor | Ha, Jeongseok | - |
dc.contributor.nonIdAuthor | Jeon, Hyoungsuk | - |
dc.contributor.nonIdAuthor | Choi, Jinho | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Channel estimation | - |
dc.subject.keywordAuthor | information leakage | - |
dc.subject.keywordAuthor | large antenna arrays | - |
dc.subject.keywordAuthor | multi-user | - |
dc.subject.keywordAuthor | pilot contamination attack | - |
dc.subject.keywordAuthor | secret key generation | - |
dc.subject.keywordAuthor | time division duplex | - |
dc.subject.keywordPlus | MARCUM Q-FUNCTION | - |
dc.subject.keywordPlus | OUTAGE PROBABILITY | - |
dc.subject.keywordPlus | WIRETAP CHANNELS | - |
dc.subject.keywordPlus | MULTIUSER MIMO | - |
dc.subject.keywordPlus | TDD SYSTEMS | - |
dc.subject.keywordPlus | POLAR CODES | - |
dc.subject.keywordPlus | INFORMATION | - |
dc.subject.keywordPlus | WIRELESS | - |
dc.subject.keywordPlus | CRYPTOGRAPHY | - |
dc.subject.keywordPlus | SECURITY | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.