Skip to main content
Log in

Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

The analysis of secret key capacity is an important investigation on the design of secret key agreement protocol. In this paper, we characterize the secret key capacity based on received signal envelopes obeying Nakagami-m distribution between two legitimate users, in the presence of a passive eavesdropper, when the eavesdropping channel is correlated with the legitimate channel. The expression of secret key capacity is derived based on mutual information and applies to both integer and non-integer m. Simulation results indicate that the secret key capacity is proportional to m-fading parameter and average signal-to-noise ratio (SNR) and inversely proportional to the number of paths. In addition, some behaviors of secret key capacity over a high mobility fading channel, and microcell and macrocell environments are provided. These results cover the performance of secret key capacity when the received signal envelope follows Rayleigh, Rician, and Gaussian distributions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Khan R, Kumar P, Jayakody D N K, et al. A survey on security and privacy of 5G technologies: potential solutions, recent advancements, and future directions. IEEE Commun Surv Tut, 2020, 22: 196–248

    Article  Google Scholar 

  2. Cao J, Ma M D, Li H, et al. A survey on security aspects for 3GPP 5G networks. IEEE Commun Surv Tut, 2020, 22: 170–195

    Article  Google Scholar 

  3. Wang N, Wang P, Alipour-Fanid A, et al. Physical-layer security of 5G wireless networks for IoT: challenges and opportunities. IEEE Internet Things J, 2019, 6: 8169–8181

    Article  Google Scholar 

  4. Li N, Xia S D, Tao X F, et al. An area based physical layer authentication framework to detect spoofing attacks. Sci China Inf Sci, 2020, 63: 222302

    Article  MathSciNet  Google Scholar 

  5. Chen H, Tao X F, Li N, et al. A data analysis of political polarization using random matrix theory. Sci China Inf Sci, 2020, 63: 129303

    Article  Google Scholar 

  6. Zhong B, Zhang Z S. Secure full-duplex two-way relaying networks with optimal relay selection. IEEE Commun Lett, 2017, 21: 1123–1126

    Article  Google Scholar 

  7. Zhong B, Chen L, Tang Z J. Ergodic rate analysis for full-duplex NOMA networks with energy harvesting. Sci China Inf Sci, 2021, 64: 189303

    Article  Google Scholar 

  8. Jiao L, Wang N, Wang P, et al. Physical layer key generation in 5G wireless networks. IEEE Wirel Commun, 2019, 26: 48–54

    Article  Google Scholar 

  9. Qin D R, Ding Z. Exploiting multi-antenna non-reciprocal channels for shared secret key generation. IEEE Trans Inform Forensic Secur, 2016, 11: 2693–2705

    Article  Google Scholar 

  10. Xu P, Cumanan K, Ding Z G, et al. Group secret key generation in wireless networks: algorithms and rate optimization. IEEE Trans Inform Forensic Secur, 2016, 11: 1831–1846

    Article  Google Scholar 

  11. Gong S X, Tao X F, Li N, et al. Secure secret key and private key generation in source-type model with a trusted helper. IEEE Access, 2020, 8: 34611–34628

    Article  Google Scholar 

  12. Tavangaran N, Boche H, Schaefer R. Secret-key generation using compound sources and one-way public communication. IEEE Trans Inform Forensic Secur, 2017, 12: 227–241

    Google Scholar 

  13. Tavangaran N, Schaefer R F, Poor H V, et al. Secret-key generation and convexity of the rate region using infinite compound sources. IEEE Trans Inform Forensic Secur, 2018, 13: 2075–2086

    Article  Google Scholar 

  14. Lai L F, Liang Y B, Du W L. Cooperative key generation in wireless networks. IEEE J Sel Areas Commun, 2012, 30: 1578–1588

    Article  Google Scholar 

  15. Zeng K. Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun Mag, 2015, 53: 33–39

    Article  Google Scholar 

  16. Aldaghri N, Mahdavifar H. Physical layer secret key generation in static environments. IEEE Trans Inform Forensic Secur, 2020, 15: 2692–2705

    Article  Google Scholar 

  17. Pierrot A J, Chou R A, Bloch M R. The effect of eavesdropper’s statistics in experimental wireless secret-key generation. 2013. ArXiv:1312.3304

  18. Chou T H, Draper S C, Sayeed A M. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness. In: Proceedings of IEEE International Symposium on Information Theory, Austin, 2010. 2518–2522

  19. Zhang J Q, He B, Duong T Q, et al. On the key generation from correlated wireless channels. IEEE Commun Lett, 2017, 21: 961–964

    Article  Google Scholar 

  20. Jin H L, Huang K Z, Xiao S F, et al. A two-layer secure quantization algorithm for secret key generation with correlated eavesdropping channel. IEEE Access, 2019, 7: 26480–26487

    Article  Google Scholar 

  21. Lai L F, Liang Y B, Poor H V. A unified framework for key agreement over wireless fading channels. IEEE Trans Inform Forensic Secur, 2012, 7: 480–490

    Article  Google Scholar 

  22. Zheng Y R, Xiao C S. Improved models for the generation of multiple uncorrelated Rayleigh fading waveforms. IEEE Commun Lett, 2002, 6: 256–258

    Article  Google Scholar 

  23. Reig J, Martinez-Amoraga M A, Rubio L. Generation of bivariate Nakagami-m fading envelopes with arbitrary not necessary identical fading parameters. Wirel Commun Mob Comput, 2007, 7: 531–537

    Article  Google Scholar 

  24. Wal J W, Sharma R K. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis. IEEE Trans Inform Forensic Secur, 2010, 5: 381–392

    Article  Google Scholar 

  25. Nakagami M. The m-distribution — a general formula of intensity distribution of rapid fading. In: Statistical Methods in Radio Wave Propagation. Elmsford: Pergamon Press, 1960

    Google Scholar 

  26. Gradshteyn I S, Ryzhik I M. Table of Integrals, Series, and Products. 6th ed. Orlando: Academic Press, 2000

    MATH  Google Scholar 

  27. Bloch M, Barros J. Physical-Layer Security: from Information Theory to Security Engineering. Cambridge: Cambridge University Press, 2011

    Book  MATH  Google Scholar 

  28. Gamal A E, Kim Y H. Network Information Theory. Cambridge: Cambridge University Press, 2011

    Book  MATH  Google Scholar 

  29. Yip K W, Ng T S. A simulation model for Nakagami-m fading channels, m < 1. IEEE Trans Commun, 2000, 48: 214–221

    Article  Google Scholar 

  30. Szabo Z. Information theoretical estimators toolbox. J Mach Learn Res, 2014, 15: 283–287

    MATH  Google Scholar 

  31. Braun W R, Dersch U. A physical mobile radio channel model. IEEE Trans Veh Technol, 1991, 40: 472–482

    Article  Google Scholar 

  32. Cover T M, Thomas J A. Elements of Information Theory. 2nd ed. Hoboken: Wiley, 2006

    MATH  Google Scholar 

  33. Ribouh S, Malawade A V, Elhillali Y, et al. Channel state information-based cryptographic key generation for intelligent transportation systems. IEEE Trans Int Trans Syst, 2021, 22: 7496–7507

    Article  Google Scholar 

  34. Azam M I. Impact of variability of Nakagami-m parameter on the performance of digital communication systems. 2006. http://eprints.kfupm.edu.sa/9763/1/9763.pdf

  35. Reig J, Rubio L, Cardona N. Bivariate Nakagami-m distribution with arbitrary fading parameters. Electron Lett, 2002, 38: 1715–1717

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by National Key R&D Program of China (Grant No. 2019YFE0114000), in part by National Natural Science Foundation of China (Grant Nos. 61932005, 62071066), in part by Shenzhen Science and Technology Innovation Commission Free Exploring Basic Research Project (Grant Nos. 2021Szvup008, JCYJ20170307172830043), in part by National High-tech R&D Program of China (Grant No. 2014AA01A701), in part by 111 Project of China (Grant No. B16006), and in part by Fundamental Research Funds for the Central Universities (Grant No. 2020RC39).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaofeng Tao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gong, S., Tao, X., Li, N. et al. Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel. Sci. China Inf. Sci. 65, 192304 (2022). https://doi.org/10.1007/s11432-021-3353-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-021-3353-5

Keywords

Navigation