About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
Allerton 2009
Conference paper
A note on information-theoretic secret key exchange over wireless channels
Abstract
For wireless channels, a number of informationtheoretic secret key exchange protocols have been proposed and analyzed for their efficiency in the literature. We contend that for such protocols in a realistic adversarial model that includes an active adversary, average number of message-bits that need to be exchanged to obtain one-bit of secret key is an important performance metric, which has been previously overlooked in the literature. Using this insight, we analytically study a recently popular class of information-theoretic secret key exchange protocols that is based on wireless channel fading. We obtain analytical results for specific cases and provide fundamental insights into the competitive performance of this class of information-theoretic secret key exchange protocols. ©2009 IEEE.