Özet
The channel-based key generation methods, commonly used in time-division duplexing channels, encounter limitations in frequency-division duplexing (FDD) scenarios due to a lack of channel reciprocity. Consequently, conventional FDD key generation methods rely on multiple signal exchanges between Alice and Bob. These exchanges, however, risk exposing channel-related details that an eavesdropper could potentially exploit to compromise the security of the generated key. To address this, this letter proposes a novel FDD key generation method that avoids sharing channel-related information, allowing Alice and Bob to independently generate secure keys based solely on local channel estimations. Extensive simulations highlight the vulnerability of conventional FDD methods and demonstrate that the proposed method doubles the key generation rate compared to conventional methods while resisting the proposed attack.
| Orijinal dil | İngilizce |
|---|---|
| Sayfa (başlangıç-bitiş) | 1446-1450 |
| Sayfa sayısı | 5 |
| Dergi | IEEE Wireless Communications Letters |
| Hacim | 14 |
| Basın numarası | 5 |
| DOI'lar | |
| Yayın durumu | Yayınlandı - 2025 |
Bibliyografik not
Publisher Copyright:© 2012 IEEE.
Parmak izi
FDD Secret Key Generation: Identifying Vulnerabilities and a Novel Defensive Method' araştırma başlıklarına git. Birlikte benzersiz bir parmak izi oluştururlar.Alıntı Yap
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver