Secure Wireless Key Establishment Using Retrodirective Array

Yuan Ding, Junqing Zhang, Vincent Fusco

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
311 Downloads (Pure)

Abstract

In this paper a new method of establishing secret keys for wireless communications is proposed. A retrodirective array (RDA) that is configured to receive and re-transmit at different frequencies is utilized as a relay node. Specifically the analogue RDA is able to respond in ‘real-time’, reducing the required number of time slots for key establishment to two, compared with at least three in previous relay key generation schemes. More importantly, in the proposed architecture equivalent reciprocal wireless channels between legitimate keying nodes can be randomly updated within one channel coherence time period, leading to greatly increased key generation rates (KGRs) in slow fading environment. The secrecy performance of this RDA assisted key generation system is evaluated and it is shown that it outperforms previous relay key generation systems.
Original languageEnglish
Title of host publicationProceedings of Globecom Workshop 2016: 4th Workshop on Trusted Communications with Physical Layer Security
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)978-1-5090-2482-7
DOIs
Publication statusPublished - 09 Feb 2017
EventIEEE Global Communications Conference 2016 - The Washington Hilton, Washington DC, United States
Duration: 04 Dec 201608 Dec 2016
http://globecom2016.ieee-globecom.org/
https://sites.google.com/site/globecomtcpls/home/tcpls2016

Conference

ConferenceIEEE Global Communications Conference 2016
Abbreviated titleGLOBECOM 2016
Country/TerritoryUnited States
CityWashington DC
Period04/12/201608/12/2016
Internet address

Keywords

  • Wireless Communication Systems
  • retrodirective array
  • key generation

Fingerprint

Dive into the research topics of 'Secure Wireless Key Establishment Using Retrodirective Array'. Together they form a unique fingerprint.

Cite this