35
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack

      Preprint
      , , ,

      Read this article at

          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We present a secret key agreement (SKA) protocol for a multi-user time-division duplex system where a base-station (BS) with a large antenna array (LAA) shares secret keys with users in the presence of non-colluding eavesdroppers. In the system, when the BS transmits random sequences to legitimate users for sharing common randomness, the eavesdroppers can attempt the pilot contamination attack (PCA) in which each of eavesdroppers transmits its target user's training sequence in hopes of acquiring possible information leak by steering beam towards the eavesdropper. We show that there exists a crucial complementary relation between the received signal strengths at the eavesdropper and its target user. This relation tells us that the eavesdropper inevitably leaves a trace that enables us to devise a way of measuring the amount of information leakage to the eavesdropper even if PCA parameters are unknown. To this end, we derive an estimator for the channel gain from the BS to the eavesdropper and propose a rate-adaptation scheme for adjusting the length of secret key under the PCA. Extensive analysis and evaluations are carried out under various setups, which show that the proposed scheme adequately takes advantage of the LAA to establish the secret keys under the PCA.

          Related collections

          Most cited references19

          • Record: found
          • Abstract: not found
          • Article: not found

          Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Noiseless coding of correlated information sources

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Generalized privacy amplification

                Bookmark

                Author and article information

                Journal
                2015-06-30
                Article
                10.1109/TWC.2015.2456894
                1507.00095
                355d564f-dd23-419d-818b-0017c36d71ac

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                15 pages, 5 figures, and the paper is under minor revision for the publication in IEEE transactions on wireless communications
                cs.CR cs.IT math.IT

                Numerical methods,Security & Cryptology,Information systems & theory
                Numerical methods, Security & Cryptology, Information systems & theory

                Comments

                Comment on this article