1. Introduction
Physical layer-based security protocols received a great attention from the researchers in both the security field and the communication filed since Shannon paper [1] and Wyner[2]. From these two papers, the term information theoretical security became in the wireless communication, which divides into two main branches. First, the channel model, which deals with the transmission rate between the communicated nodes to be better thanthe channel capacity between them and an eavesdropper to maintain the confidentiality of the link without encryption. Second, the source model, which depends on the features of the link between the communicated nodes to share a common randomness source for the generation of a shared secret key.
In many previous pieces of research such as [3]-[5] handled the challenge of establishing a shared secret key as a source model for TDD systems to utilize the benefits of the channel reciprocity in key generation. According to [6], there are five stages to extract a common bit string to be used as a symmetric key from the physical features of a wirelesslink between a pair of nodes, i.e., single hop connection: channel estimation, randomnessextraction, quantization, reconciliation, and privacy application. The purpose of the first two stages is to recognize a common randomness source used for the generation of asecret key, which is under thought in this article. The other stages roles are to extract anumber of bits, from the observed randomness source, to be the shared secret key. Thenoisy observation, between a pair of nodes resulted from the first two stages, needs anextraction procedure to drive reliable bit strings. The secret key rate estimated from thenoisy observation regarded as the upper bound rate for the whole process. Moreover, it iscommon in wireless systems that there is no statistical relationship between opponentchannels and legitimate user channels, even if there is a separation by a few centimeters from each other [7]. The establishment of a shared secret between a set of the nodes is more difficult than between two nodes because of the distinctive arbitrary channels related to these nodes.
In [8], they introduced the first group secret key generation based on the source model. After that, a number of tree-based schemes, [9]-[13], adopted the point-to-pointmechanism to generate a group secret key among a group of nodes. Moreover, convincing schemes suggested for the generation of a secret key between multi-terminals concerning wireless networks by taking advantage of the channel properties in [14]-[16]. Theseschemes are more applicable to actual structures at the detriment of some scarification in the rate of the generated secret key in TDD systems. In [17], the authors considered the problem of the group secret key establishment for different models of wireless networks. They merged the approved single-hop key agreement, the segmentation strategy, and theone-time-pad procedure to generate the group key in a TDD system employing thereciprocity feature of the wireless channel.
All the research related to this discipline oriented to the TDD system to get the benefits of the channel reciprocity feature to establish a group shared secret key. Despite that, most of the efficient wireless systems depend on FDD especially 5G networks, there is no, formy knowledge, group key generation scheme suggested for FDD networks. In the FDDsystem condition, the treatment of two different channels concurrently for transmitting and receiving leads to lose the benefit of the channel reciprocity feature used in the key generation method as in TDD system. Therefore, the characteristics of channel statusinformation (CSI) used in [18]-[20] to create a shared key could not be used directly in FDD mode.
I submit in this paper, a new procedure for generation of a secret key between multi-nodes, without using the reciprocity feature of the linked channels. These nodes arecommunicated in a different wireless form, especially, the triangle topology, the multi-terminal star topology, and the multi-node chain topology. First, the suggested strategy is validated using a simple triangle wireless topology, where three authorized terminals want to have a common secret key between them without the leakage of any informationabout that key to anyone outside the group. Moreover, I investigate a more difficultarrangement, star topology, where the secret key generation rate between (≥ 3) authorized terminals are in centralization-shape is derived. Finally, the process of generating the proposed shared secret key for FDD systems offered in the chain topology of wireless networks. My suggested group key establishment approach depends onmerging my FDD point-to-point key generation mechanism [21], and the bitwise XOR process. In the following points, I summarize my contribution:
- Figure out the secret key rate for a multi-point wireless communication system in FDD mode.
- Triangle topology: I proposed an algorithm for the establishment of a shared secret key between three nodes, based on a bitwise XOR method, for a triangle topology in an FDD mode for 5G networks. The essential part of my suggested algorithm is applying only one-time pad operation between any two FDD-based pairwise key generated among a pair of nodes, and utilize it to generate a shared secret key between the three nodes. Then, the upper bound rate of the generated group key in the suggested algorithm demonstrated.
- Multi-terminal star network: an algorithm for the generation of a shared secret key between multi-terminals based on bitwise XOR proposed for a star topology in FDD mode of 5G networks. Where, the central node selects, randomly, a pairwise secret key, and sequential broadcasting the resultant of the bitwise XOR operation between the selected key with all other generated pairwise keys one by one. Then, the upper bound for the generation rate of the group key in the suggested algorithm illustrated.
- Multi-node chain network: a bitwise XOR based group key agreement scheme suggested for a chain topology consist of authorized entities. Then, I derive the upper bound for the group key generated rate.
The choice of the topologies in my suggested schemes came from the relevance of thesearrangements for the wireless FDD system.
The remaining of the paper arranged as follows. Section II describes the wireless communication system model under investigation and provides the assumption necessary for my suggested schemes. I revisit the key generation for one hop in FDD mode for 5Gnetworks and determine its secret key rate in sections III for consistency. In section IV, I suggest an algorithm for the group secret key generation for a three-node network. Another scheme for multi-nodes in FDD systems, star topology, is given in section V, and show the impact of the number of terminals on the generated secret key rate. Section VI presents the group key generation for chain networks. Numerical results and comparisons are given in section VII; finally, concluding notes is presented in section VIII.
2. System Model
The system model for the group key generation scheme and its associated systemassumption demonstrated as follows.
I’m dealing with the difficulty of establishing a shared secret key among a group of nodesin FDD systems, where ( ≥ 3) authentic nodes desire to produce a shared secret key over a full-duplex wireless communication link in the existence of an inactive opponent. In this scheme, all the authentic nodes can send signals over fading links, and they assumed to be full-duplex nodes, i.e., any node uses two different bands for transmission and reception of the signals. Each node ( ∈ {1, … , }) sends a known signal overspecific channel use. The signals reached, the other terminals and the eavesdropper are:
= ℎ , + ,∀ ∈ {1, … , }, ≠ ; (1)
= ℎ , + , (2)
where ℎ , and ℎ , denote the channel status from terminal to the terminal , and the eaves dropper, respectively; and are additive white Gaussian noise with zero meanand variance 2 at the terminal and the eavesdropper, respectively.
All the fading coefficients are supposed to be independent and identically distributed, so, ℎ , is independent of ℎ , . Furthermore, I suppose that no node has any informationabout the channel properties of the communication links before communicating with any node; however, channel state information statistical distributions presented at each terminal. For clarification, I suppose that the channel gains are a univariate normal distribution with zero means. Moreover, in this research, I suppose that all the nodes cantransmit and receive simultaneously between each other, i.e., full-duplex mode. In addition, I consider that the fading coefficient of the wireless channel remains fixed for aduration T. After that, it switches randomly to another independent quantity at the start of every cycle of duration T. These recognized as slow block fading model in the literature. Remark that these assumptions regularly utilized in most of the current associated research for the generation of a shared secret key in wireless communication [22]-[24 ]. For each ∈ {1, … , } , let = [ (1), … , ( )] represent the signals sent by terminal in channel uses. As in [20], I suppose that the transmitted powerconstraint for each terminal is equal for simplicity, i.e.:
{ } ≤ ,∀ ∈ {1, … , }. (3)
Besides the usage of the wireless channels, those authentic nodes additionally utilize apublic channel to exchange messages, which will be overheard by the opponent. This hypothesis of public channel usage has commonly assumed in related works [22]-[24].
The eavesdropper is inactive, which restricts its role in the communication system forreceiving only the transmitted information from other members in the system. I expressall the exchange messages in the public channel as . All the authentic nodes in thenetwork desire to have a common secret key among them, by exchanging messagesthrough wireless channels and the public channel. I denote the pairwise key generation function associated with terminal as , i.e., , = ( , , ), where is thesignals received by terminal . A group key rate is said to be achievable if, forany > 0 , there occurs an algorithm and a random variable such that:
, ≠ ≤ , = 1, … , , (4)
; ≤ , (5)
≥ − . (6)
Here (4) expresses that the group key generated at all the nodes depending on the used function is equal with high probability, (5) denotes that the eavesdropper acquires alimited amount of information about the generated group key. Finally, (6) ensure that therate of the generated key is at least equal to the normalized entropy of the generated key.
3. Pairwise Key Generation For FDD System
In an FDD system, each pair of node communicates over two different bands, one for transmission and another for receiving signals, simultaneously. So each link between twonodes composite of two paths, with two different channel status, between them. The key generation problem between two nodes, in FDD systems, is more complicated due to the non-reciprocity of the channel gains between the two nodes. Now, I’m studying the possibility of generating a shared secret key depending on physical layer features of the wireless network in FDD mode with a non-zero rate. This will be the beginning of generating a secret key between a number of users. Followed by another step, which will discuss in the coming sections. The following algorithm shows the suggested key generation scheme for point-to-point FDD communication mode.
Fig. 1. Single Hop.
The system model for the suggested scheme shown in Fig. 1, where two nodes attempt to establish a secret key from the common observation of the composed channel gains of the full duplex link (ℎ ℎ ). The corresponding resource element of the scheme shown in Fig. 2, where the coherence time split into two training allocation sequence, forward channel training sequence and reverse channel training sequence. I assume that transmission between node to node carried over frequency 1. Simultaneously, from node to node carried over frequency 2.
Fig. 2. Recourse Elements for Point-to-Point Link.
The proposed key generation scheme outlined in Algorithm A. For channels ℎ and ℎ , after the forwarding phase of the channel estimation, both nodes receive:
′ = ℎ + (7)′ = ℎ + (8)
Simultaneously. After that, both of interacted nodes feedback their received signals, after the reverse channel training phase, both nodes receive:
= ℎ ′ + = ℎ ℎ + ℎ + (9)
= ℎ ′ + = ℎ ℎ + ℎ + (10)
Simultaneously. From these observations, both nodes get the following estimates:ℎ( ) =‖ ‖2
= ℎ ℎ + ℎ‖ ‖2
+‖ ‖2(11)ℎ( ) =‖ ‖2
= ℎ ℎ + ℎ‖ ‖2
+‖ ‖2(12)
Theorem 1.
The distribution of the common observation ℎ ℎ is a univariate normal distribution with variance 2 + 2 and zero mean.
Proof. For details of the proof, please refer to the appendix section.
So that, ℎ( ) is a zero mean Gaussian random variable, with variance 2 ++‖ ‖2 +‖ ‖22 +‖ ‖
2 , and similarly, ℎ
( ) is a zero mean Gaussian random variable, with variance, 2 +2 +‖ ‖22 +‖ ‖2+‖ ‖2.
From equations (11) and (12), I recognize that there is a common observation ℎ ℎ , from which both nodes can use it as a common randomness source to generate a shared secretkey.
Assuming that both nodes transmit signals with transmitted power during the channelestimation phase, I have ‖ ‖2 =.
Based on the lemma of data processing in [26], it is easy to observe, the validation of the following Markovian relationship [22]:
ℎ( ) ⟷ ⟷ ℎ ℎ ⟷ ⟷ ℎ ( ) Which implies ℎ( ); ℎ( ) ≤ ( ; ).
Similarly, from the Markovian relationship
⟷ ℎ( ) ⟷ ℎ ℎ ⟷ ℎ( ) ⟷
I have ℎ
( ); ℎ( ) ≥ ( ; ).
As a result of lemma 3.1 in [21], ℎ
( ); ℎ( ) = ( ; ), which indicates that ℎ( ) andℎ( ) maintain the mutual information between and ; which can be used to computethe rate of a generated secret key between two nodes.
From ℎ( ), ℎ( ), one can evaluate the secret key rate [27] as following:
(13)
(14)
Theorem 2.
The key rate of point-to point FDD link is: (15)
Proof. For details of the proof, please refer to the appendix section.
To simplify the equation of the secret key generation rate over a link , I will assumethat the variances of the channel gains for the two paths for a single link are equal, i.e.:
(16)
So, (17)
4. Group Key Generation For Triangle Topology
Fig. 3. Triangle Topology.
Now, I’m examining the group key generation problem in its simplest structure between three authentic terminals (i.e., terminals 1, 2 and 3, as presented in Fig. 3). For clearness, I suppose that all the channel gains of all the paths ℎ for the forward transmission and ℎ for the reverse channel, where , ∈ {1,2,3}, are univariate normal distributions with zero and variance 2 , where ∈ {1,2,3}. A bitwise XOR process based scheme issuggested for this topology to generate a secret key shared between the three terminals, and the associated parameters are recognized. In section V and VI, I will expand mychallenge to cover a network consists of more than three nodes.
The proposed bitwise XOR based key generation scheme outlined in Algorithm B, where three authentic terminals begin by point-to-point secret key generation based on the physical layer attributes of the connections between them. Then a group key is created depending on a bitwise XOR mechanism and exchanging messages over the publicchannel. I present my protocol in Algorithm B.
In the point-to-point key agreement phase, based on the common observation betweeneach pair of terminals (presented in Fig. 3) that resultant from the training method and the point-to-point key generation technique in Section III, every two terminals can accept onan approximately uniformly distributed shared secret key with rate =, wheredefined as in (17),where ∈ {1, 2,3}.
The phase of group key generation is the most important component of my submitted algorithm. Node 1 sends 1⨁ 3 over the public channel, so the other nodes acquire1 and 3. In this case, the three nodes share 1 and 3. Clearly, due to the operation of a one-time pad [1], the opponent gains no information about 1 and 3 . To obtain the group key, I have to concatenate both keys ( 1 ∥ 3) , which achieved with the group key generation rate for triangle topology:
(18)
As revealed, the rate of a group key generation for a triangle topology is equivalent to the summation of the rate of a secret key generation over two links.
5. Group Key Generation In Star Networks
In this section, I examine the generation of a shared secret key between numbers of authentic terminals in a star configuration. A model for the star network, with fourauthentic terminals, presented in Fig. 4. The common observation between the terminals shown in the figure, from which a pairwise secret key generated over each link ∈{1,2, … , ( − 1)} with rate . A bitwise XOR-based scheme suggested for this configuration, and the associated parameters are recognized as follows.
Fig. 4. Star Topology.
As in Section IV, the point-to-point and group key agreements phases summarized in the following key generation protocol, as exposed in Algorithm C.
In the point-to-point key agreement phase, based on channel characteristics (presented in Fig. 4), and the point-to-point key establishment technique in Section III, point-to-point secret keys generated by employing the channel characteristics between theterminals, as presented in Section III. Referring to equation (17), the rate of ( = 1, … , − 1) derived as =, where expressed as in equation (17).
In the group key agreement phase, I concatenate the generated ( − 1) independent pairwise keys to achieving the concluding shared secret key among the nodes. Initially, the centralized node selects randomly ( = 1, … , − 1) and then XORing it withanother pairwise key generated in sequence, ⨁ , and then it delivers results to othernodes over the public channel. Repeat sending these key ( − 1) times till all theterminals obtain all other keys. Note that the delivering order between these terminals is ( 1⨁ 2, 1⨁ 3, . . . , 1⨁ −1), in case that 1 is randomly selected by the central node.
Clearly, the opponent gains no information about each key, since the one-time padoperation [1] used. Finally, resulting group key ( 1 ∥ 2 ∥ 3 ∥ ⋯ ∥ −1) achieved by concatenating these group keys with the rate of:
(19)
Assuming the entire generated pairwise secret keys are equal, i.e.:
(20)
(21)
Where, suffix in the above equation indicates for any link, under the above assumption.
6. Group Key Generation In Chain Network
In this section, Algorithm A suggested for the triangle topology in Section IV is expanded to the chain topology with authentic nodes. For simplicity, I suppose that all the channel gains of all the paths ℎ for the forward transmission and ℎ for the reversechannel where , ∈ {1, … , }, are univariate normal distributions with zero means and variance 2, where ∈ {1, … , − 1}.
Fig. 5. Chain Topology.
As presented in Algorithm D, the suggested communication protocol consisted of twophases: point-to-point key agreement and group key agreement.
In the point-to-point key agreement phase, based on channel characteristics (presented in Fig. 5) and the point-to-point key generation technique in Section III, every adjacent node( , ) ∈ {(1,2), (2,3), … , ( − 1, )}, accept a secret key ∀ ∈ {1,2, … , − 1} from the common observation (ℎ ( ),ℎ ( −1)). Therefore, there are − 1 separate secret keys. The rate of can express as =, where presented in (17).
In the group key agreement phase: First, node 2 forwarding ( 1⨁ 2)to its neighbor node3 over a public channel. Sequentially, node 2 forwarding ( 1⨁ 3) to its neighbor node 4, and so on till the last node. Clearly, the opponent obtains no information about any key, due to the one-time pad operation [1] in the algorithm. The result group key 1 can be obtained for each node in the chain with the rate,
(22)
Since a simple bitwise XOR operation is used by the terminals to spread the generated point-to-point keys between terminals in the group key agreement phase, the suggested protocol in both Algorithms C and D has complexity ( ) for a certain time tuple. This means that the suggested schemes have linear complexity corresponding to the number of authentic terminals. Related to the current tree-based schemes in [9]-[11] with polynomial complexity, the suggested schemes in this paper maintain lower complexity.
7. Numerical Results
Now, the analysis concluded in this paper will confirm with some numerical illustrations. I explain the effect of the four parameters (Coherence time - allocation time for training -variance of the channel gain - variance of the noise) on the group secret key generation rate in the three suggested topologies so that I can maintain the positive effect to improvethe rate. For simplicity, all noise variances are suggested to be unity (i.e., 2 = 1). Consequently, the signal-to-noise ratio (SNR) will be reduced to be the transmitted power P.
From all the derived equations for the group key rates for the three given topologies, I canconclude that the rate of the star topology is the greater as it increases linearly as the number of nodes increases.
I first consider the effect of the channel coherence time, which is one of two variables in the group key rates of the three topologies, on the group secret key rate in the threesuggested networks as shown in Fig. 6. From this figure, it can observe that the key rateis decreasing as coherence time increase because the normalization factor 1/T in the rateis due to the fact that the channel characteristics do not change for the coherence period , therefore the communication nodes can estimate only one value of the channeldistribution for every T symbol. Accordingly, my suggested methodology is suitable forslow fading channel situations.
Fig. 6. Comparison of key rates for different channel coherence time for: Fig. 7. Comparison of key rates for different Training Duration Distribution for:
Secondly, I consider the effect of the duration of the training sequence for both the forward channel and the reverse channel in FDD systems on the secret key rate in the three suggested networks as shown in Fig. 7. The figure shows that as the time allocation for forwarding channel-training increase with respect to the part allocated for reversechannel training, the generation rate of the secret key per channel use increase. That is because the individual channel gain estimated during the forwarding path at each node, but the reverse path used only as feedback for the knowledge of the reverse channel gain. This result drives us for improving the rate of my suggested technique, and employ it for future work.
Fig. 8 shows the effect of the channel gain on the group key rate, of course, these gainsconsidered as coefficients in the equation that is why the increase in the curves is constant. I examine the effect of the channel gain variances of reverse and forward paths on the rate with three different values.
I assume the entire channel gains variances are equal and the noise variances are unity. The figure shows that as I increase the channel gain for the paths, the rate increase. This result is because the increase in the channel gain increases the randomness of the common observation between the nodes, which use as the source for the key generation.
Fig. 8. Comparison of key rates for different channel gain variance for:
Fig. 9. Comparison of key rates for different noise variance for:
In Fig. 9, I examine the effect of the noise variances on the group key rate with threedifferent values. I assume the entire channel gains variances are equal to 1. The figureshows that as the noise variance increase, the key rate per channel use decrease. These aredue to the effect of the noise on the common observation of the users, which leads todecrease the signal to noise ratio of the common observation. These will reduce the number of common bits, which can be detected to generate the key.
Finally, key rates of star topology examined in Fig. 10 as a variable of the number of authentic terminals (i.e., N), where T = 15, the variances of all channel characteristics are equal to one, and the power P = 10, 20 or 40. The figure shows the group key rate rates for the star topology increase as the number of authentic nodes increases. That is because they accomplish multiplexing gains ( − 1), as shown in the equation.
To clarify the performance improvement of my schemes, I compare my proposed schemes with the benchmark schemes in [17] following the same input parameters. Table 1 summarizes the comparison.
Fig. 10. Comparison of key rates against the number of authentic nodes for different transmitted power in the star topology.
Table 1. Comparison of the performance of the suggested schemes and the benchmark schemes
In Table 1, we held a comparison between our suggested protocol and the benchmarkwork in [17], which designed for the same purpose and discussed in the introductionsection. In [17], the authors suggested a group key generation schemes depending on thereciprocal property of the TDD system, which is not supported for 5G networks. In my suggested schemes, I offered a solution based on FDD technology to support the 5Gnetworks. Besides that, my schemes provided a higher secret group key rate than the benchmark work, and that because the key rate resulting from a single fading channel based randomness source is the smallest and the key rate depending on the FDD system is bigger whatever the value of the transmitted signal. That is because as we increase the number of the channel gains composing the randomness source, the amount of entropy in the constructed source increase.
8. Conclusions
A novel group key generation mechanism with low-complexity, compared with tree-based algorithms, has suggested for various topologies suitable for FDD systems, which depended on the proper merging of my suggested point-to-point key generation approach for FDD systems, and the well-known bitwise XOR operation. My suggested approaches based on the features of fading channel for wireless communication in FDD mode. I applied my suggested approach on triangle topology, star topology and chain topology, which are, the more relevant topologies for wireless communication in FDD mode. From the viewpoint of key generation rate, star topology is the best as the rate increase linearly as the number of nodes increases. In addition, my result shows that the rate of the generated secure key in all suggested topologies can be improved as the reverse training allocation decrease, which can be future work in this trend.
Appendix
Proof of Theorem 1: Since the two-channel status, ℎ and ℎ , are assumed to be a univariate normal distribution with variance 2 and 2, respectively, and zero mean.
As shown in [25], the product of two Gaussian random variables is a scaled Gaussiandistribution, and the scale is Gaussian.
The Product of two Gaussians PDFs ℎ ~ , 2 and ℎ ~ , 2 is: (23)
Where, (24) (25)
Under my assumption, I have zero mean in all the random variables distribution. Then,
= 0 and =2 +
For any 1 ~ ( 1, 12) , 1 = ( 1, 2 12), scaling of the normal distribution. So,
(26)
Proof of theorem 2:
From [26], I can evaluate the rate of the generated key by:
(27)
I can rewrite as follows:
(28)
Similar to [28], I have:
(29)
(30)
The equality in (30) will hold if I choose so that ℎ( ) − ℎ( )and ℎ( )are independentand ℎ( ); ℎ( ) are jointly Gaussian. So that,= ℎ( ); ℎ( )
ℎ( )
(31)
Where: ℎ
(32)
Since the mean of both ℎ( ) and ℎ( ) are zero, the covariance:ℎ( ); ℎ( ) = ℎ ℎ =2 + (33)
So, the upper bound for ℎ ℎ( )| ℎ( ) is:
ℎ ℎ( )| ℎ( ) = ℎ ℎ( ) − ℎ( ) (34)
Since 1 = ( 1, 2 12).
(35) So: (36)
Accordingly, I can conclude an equation for the secret key generation over a point-to-point link as follows: (37)
References
- C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
- Yuexing Peng, Peng Wang, Wei Xiang, Yonghui Li, "Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels," Wireless Communications IEEE Transactions on, vol. 16, no. 8, pp. 5176-5186, 2017. https://doi.org/10.1109/TWC.2017.2706657
- S. Zhang, L. Jin, Y. Lou and Z. Zhong, "Secret key generation based on two-way randomness for TDD-SISO system," China Communications, vol. 15, no. 7, pp. 202-216, 2018. https://doi.org/10.1109/CC.2018.8424614
- P. Xu, Z. Ding, X. Dai, and K. K. Leung, "A general framework of wiretap channel with helping interference and state information," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 182-195, Feb. 2014. https://doi.org/10.1109/TIFS.2013.2295031
- J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, "Key generation from wireless channels: A review," IEEE Access, vol. 4, pp. 614-626, Mar. 2016. https://doi.org/10.1109/ACCESS.2016.2521718
- V. Granatstein, "Physical principles of wireless communications," Boca Raton, FL: CRC Press, 2012.
- Csiszar and P. Narayan, "Secrecy capacities for multiple terminals," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004. https://doi.org/10.1109/TIT.2004.838380
- C. Ye and A. Reznik, "Group secret key generation algorithms," in Proc. of IEEE Int. Symp. Inf. Theory, pp. 2596-2600, Jun. 2007.
- S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, "Secret key generation for a pairwise independent network model," IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6482-6489, Dec. 2010. https://doi.org/10.1109/TIT.2010.2081210
- S. Nitinawarat and P. Narayan, "Perfect omniscience, perfect secrecy, and Steiner tree packing," IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6490-6500, Dec. 2010. https://doi.org/10.1109/TIT.2010.2081450
- L. Lai and S.-W. Ho, "Simultaneously generating multiple keys and multi-commodity flow in networks," in Proc. of IEEE Inf. Theory Workshop (ITW), pp. 627-631, Sep. 2012.
- H. Zhang, L. Lai, Y. Liang, and H. Wang, "The capacity region of the source-type model for secret key and private key generation," IEEE Trans. Inf. Theory, vol. 60, no. 10, pp. 6389-6398, Oct. 2014. https://doi.org/10.1109/TIT.2014.2340400
- Q. Wang, H. Su, K. Ren, and K. Kim, "Fast and scalable secret key generation exploiting channel phase randomness in wireless networks," in Proc. of IEEE INFOCOM, pp. 1422-1430, Apr. 2011.
- H. Liu, J. Yang, Y. Wang, and Y. Chen, "Collaborative secret key extraction leveraging received signal strength in mobile wireless networks," in Proc. of IEEE INFOCOM, Orlando, FL, USA, pp. 927-935, Mar. 2012.
- H. Liu, J. Yang, Y. Wang, Y. Chen, and C. E. Koksal, "Group secret key generation via received signal strength: Protocols, achievable rates, and implementation," IEEE Trans. Mobile Comput., vol. 13, no. 12, pp. 2820-2835, Dec. 2014. https://doi.org/10.1109/TMC.2014.2310747
- P. Xu, K. Cumanan, Z. Ding, X. Dai, and K. Leung, "Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization," IEEE Trans. On Information Forensics and Security, vol. 11, no. 8, pp. 1831-1846, Aug. 2016. https://doi.org/10.1109/TIFS.2016.2553643
- C. Thai, J. Lee, J. Prakash and T. Quek, "Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology," IEEE Transactions on Information Forensics and Security, vol. 14, no. 1, pp. 18-33, 2019. https://doi.org/10.1109/TIFS.2018.2837661
- T. Tang, T. Jiang and W. Zou, "Group secret key generation in physical layer, protocols and achievable rates," in Proc. of 2017 17th International Symposium on Communications and Information Technologies (ISCIT), 2017.
- S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, "Radio telepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. of ACM Conf. Mobile Comput. Network., pp. 128-139, Sept. 2008.
- A. Allam, "A secret key establishment in frequency division duplex communication systems under active attacker," Security and Privacy, vol. 1, no. 5, p. e45, 2018. https://doi.org/10.1002/spy2.45
- L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 480-490, Apr. 2012. https://doi.org/10.1109/TIFS.2011.2180527
- G. Li, A. Hu, C. Sun and J. Zhang, "Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems," IEEE Communications Letters, vol. 22, no. 12, pp. 2487-2490, 2018. https://doi.org/10.1109/LCOMM.2018.2875708
- Y. Peng, P. Wang, W. Xiang and Y. Li, "Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels," IEEE Transactions on Wireless Communications, vol. 16, no. 8, pp. 5176-5186, 2017. https://doi.org/10.1109/TWC.2017.2706657
- P. Bromiley, "Products and convolutions of Gaussian distributions," Medical School, Univ. Manchester, Manchester, UK, Tech. Rep, vol. 3, p. 2003, 2003.
- T. M. Cover and J. A. Thomas, "Elements of Information Theory," 2nd ed. Hoboken, New Jersey: John Wiley & Sons, Inc., 2006.
- R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, Part I: Secret sharing," IEEE Trans. Inform.Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993. https://doi.org/10.1109/18.243431
- M. Medard, "Capacity of Correlated Jamming Channels," in Proc. of Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 1997.