TY - GEN
T1 - ARQ-based secret key sharing
AU - Latif, Mohamed Abdel
AU - Sultan, Ahmed
AU - El Gamal, Hesham
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-22
PY - 2009/11/19
Y1 - 2009/11/19
N2 - This paper develops a novel framework for sharing secret keys using existing Automatic Repeat reQuest (ARQ) protocols. Our approach exploits the multi-path nature of the wireless environment to hide the key from passive eavesdroppers. The proposed framework does not assume the availability of any prior channel state information (CSI) and exploits only the one bit ACK/NACK feedback from the legitimate receiver. Compared with earlier approaches, the main innovation lies in the distribution of key bits among multiple ARQ frames. Interestingly, this idea allows for achieving a positive secrecy rate even when the eavesdropper experiences more favorable channel conditions, on average, than the legitimate receiver. In the sequel, we characterize the information theoretic limits of the proposed schemes, develop low complexity explicit implementations, and conclude with numerical results that validate our theoretical claims. ©2009 IEEE.
AB - This paper develops a novel framework for sharing secret keys using existing Automatic Repeat reQuest (ARQ) protocols. Our approach exploits the multi-path nature of the wireless environment to hide the key from passive eavesdroppers. The proposed framework does not assume the availability of any prior channel state information (CSI) and exploits only the one bit ACK/NACK feedback from the legitimate receiver. Compared with earlier approaches, the main innovation lies in the distribution of key bits among multiple ARQ frames. Interestingly, this idea allows for achieving a positive secrecy rate even when the eavesdropper experiences more favorable channel conditions, on average, than the legitimate receiver. In the sequel, we characterize the information theoretic limits of the proposed schemes, develop low complexity explicit implementations, and conclude with numerical results that validate our theoretical claims. ©2009 IEEE.
UR - http://ieeexplore.ieee.org/document/5198764/
UR - http://www.scopus.com/inward/record.url?scp=70449468047&partnerID=8YFLogxK
U2 - 10.1109/ICC.2009.5198764
DO - 10.1109/ICC.2009.5198764
M3 - Conference contribution
SN - 9781424434350
BT - IEEE International Conference on Communications
ER -