76
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Full-Duplex vs. Half-Duplex Secret-Key Generation

      Preprint
      , ,

      Read this article at

          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Full-duplex (FD) communication is regarded as a key technology in future 5G and Internet of Things (IoT) systems. In addition to high data rate constraints, the success of these systems depends on the ability to allow for confidentiality and security. Secret-key agreement from reciprocal wireless channels can be regarded as a valuable supplement for security at the physical layer. In this work, we study the role of FD communication in conjunction with secret-key agreement. We first introduce two complementary key generation models for FD and half-duplex (HD) settings and compare the performance by introducing the key-reconciliation function. Furthermore, we study the impact of the so called probing-reconciliation trade-off, the role of a strong eavesdropper and analyze the system in the high SNR regime. We show that under certain conditions, the FD mode enforces a deteriorating impact on the capabilities of the eavesdropper and offers several advantages in terms of secret-key rate over the conventional HD setups. Our analysis reveals as an interesting insight that perfect self-interference cancellation is not necessary in order to obtain performance gains over the HD mode.

          Related collections

          Author and article information

          Journal
          2015-06-29
          2016-01-20
          Article
          1506.08565
          a21e30ad-f956-4ddd-9fb3-d8e712c4f11d

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          Extended version, submitted to IEEE Transactions on Communications
          cs.IT cs.CR math.IT

          Numerical methods,Security & Cryptology,Information systems & theory
          Numerical methods, Security & Cryptology, Information systems & theory

          Comments

          Comment on this article