首页> 外文会议>2015 IEEE Conference on Communications and Network Security >Key agreement over an interference channel with noiseless feedback: Achievable region distributed allocation
【24h】

Key agreement over an interference channel with noiseless feedback: Achievable region distributed allocation

机译:具有无噪声反馈的干扰信道上的关键协议:可实现的区域和分布式分配

获取原文
获取原文并翻译 | 示例

摘要

Secret key establishment leveraging the physical layer as a source of common randomness has been investigated in a range of settings. We investigate the problem of establishing, in an information-theoretic sense, a secret key between a user and a base-station (BS) (more generally, part of a wireless infrastructure), but for two such user-BS pairs attempting the key establishment simultaneously. The challenge in this novel setting lies in that a user can eavesdrop another BS-user communications. It is thus paramount to ensure the two keys are established with no leakage to the other user, in spite the interference across neighboring cells. We model the system with BS-user communication through an interference channel and user-BS communication through a public channel. We find the region including achievable secret key rates for the general case that the interference channel (IC) is discrete and memoryless. Our results are examined for a Gaussian IC. In this setup, we investigate the performance of different transmission schemes for power allocation. The chosen transmission scheme by each BS essentially affects the secret key rate of the other BS-user. Assuming base stations are trustworthy but that they seek to maximize the corresponding secret key rate, a game-theoretic setting arises to analyze the interaction between the base stations. We model our key agreement scenario in normal form for different power allocation schemes to understand performance without cooperation. Numerical simulations illustrate the inefficiency of the Nash equilibrium outcome and motivate further research on cooperative or coordinated schemes.
机译:利用物理层作为常见随机性来源的秘密密钥建立已在一系列设置中进行了研究。我们从信息理论的角度研究了在用户和基站(BS)(通常是无线基础结构的一部分)之间建立秘密密钥的问题,但是对于尝试使用该密钥的两个这样的用户BS对同时建立。在这种新颖设置中的挑战在于用户可以窃听另一BS用户通信。因此,尽管跨相邻小区存在干扰,但是确保两个密钥的建立对其他用户没有泄漏是至关重要的。我们通过干扰信道的BS-用户通信和公共信道的BS-用户通信对系统进行建模。对于干扰信道(IC)是离散且无记忆的一般情况,我们发现了一个包含可实现的秘密密钥率的区域。我们对高斯IC的结果进行了检验。在此设置中,我们研究了不同传输方案的功率分配性能。每个BS选择的传输方案实质上会影响另一个BS用户的秘密密钥速率。假设基站是可信任的,但它们试图最大化相应的秘密密钥率,则出现了一种博弈论设置来分析基站之间的交互。我们以正常形式为不同的功率分配方案建模关键协议方案,以了解无需合作即可获得的性能。数值模拟说明了纳什均衡结果的无效性,并激发了对合作或协调方案的进一步研究。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号