{"title":"不完全了解窃听者信道的ldpc安全无线通信","authors":"M. Bloch, J. Barros, M. Rodrigues, S. McLaughlin","doi":"10.1109/ITW2.2006.323778","DOIUrl":null,"url":null,"abstract":"We present a physical layer approach aimed at providing information-theoretic security in wireless communication systems. Our secret key agreement scheme, which uses state-of-the-art error correcting codes and borrows ideas from quantum key distribution such as Gaussian reconciliation and privacy amplification, is capable of exploiting the physical properties of wireless fading channels in order to generate secret encryption keys. Focusing on the case of imperfect channel knowledge, we provide a performance analysis of the proposed security sub-system - both In theory and in practice","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"LDPC-Based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper's Channel\",\"authors\":\"M. Bloch, J. Barros, M. Rodrigues, S. McLaughlin\",\"doi\":\"10.1109/ITW2.2006.323778\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a physical layer approach aimed at providing information-theoretic security in wireless communication systems. Our secret key agreement scheme, which uses state-of-the-art error correcting codes and borrows ideas from quantum key distribution such as Gaussian reconciliation and privacy amplification, is capable of exploiting the physical properties of wireless fading channels in order to generate secret encryption keys. Focusing on the case of imperfect channel knowledge, we provide a performance analysis of the proposed security sub-system - both In theory and in practice\",\"PeriodicalId\":299513,\"journal\":{\"name\":\"2006 IEEE Information Theory Workshop - ITW '06 Chengdu\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 IEEE Information Theory Workshop - ITW '06 Chengdu\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITW2.2006.323778\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITW2.2006.323778","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
LDPC-Based Secure Wireless Communication with Imperfect Knowledge of the Eavesdropper's Channel
We present a physical layer approach aimed at providing information-theoretic security in wireless communication systems. Our secret key agreement scheme, which uses state-of-the-art error correcting codes and borrows ideas from quantum key distribution such as Gaussian reconciliation and privacy amplification, is capable of exploiting the physical properties of wireless fading channels in order to generate secret encryption keys. Focusing on the case of imperfect channel knowledge, we provide a performance analysis of the proposed security sub-system - both In theory and in practice