Secret Key Agreement: Fundamental Limits and Practical Challenges

Handle URI:
http://hdl.handle.net/10754/623187
Title:
Secret Key Agreement: Fundamental Limits and Practical Challenges
Authors:
Rezki, Zouheir; Zorgui, Marwen; Alomair, Basel; Alouini, Mohamed-Slim ( 0000-0003-4827-1793 )
Abstract:
Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.
KAUST Department:
Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division; Electrical Engineering Program
Citation:
Rezki Z, Zorgui M, Alomair B, Alouini M-S (2017) Secret Key Agreement: Fundamental Limits and Practical Challenges. IEEE Wireless Communications: 2–9. Available: http://dx.doi.org/10.1109/mwc.2017.1500365wc.
Publisher:
Institute of Electrical and Electronics Engineers (IEEE)
Journal:
IEEE Wireless Communications
Issue Date:
15-Feb-2017
DOI:
10.1109/mwc.2017.1500365wc
Type:
Article
ISSN:
1536-1284
Sponsors:
This work has been supported by a grant from King Abdulaziz City of Science and Technology (KACST), Riyadh, Saudi Arabia.
Additional Links:
http://ieeexplore.ieee.org/document/7856875/
Appears in Collections:
Articles; Electrical Engineering Program; Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division

Full metadata record

DC FieldValue Language
dc.contributor.authorRezki, Zouheiren
dc.contributor.authorZorgui, Marwenen
dc.contributor.authorAlomair, Baselen
dc.contributor.authorAlouini, Mohamed-Slimen
dc.date.accessioned2017-04-13T11:51:00Z-
dc.date.available2017-04-13T11:51:00Z-
dc.date.issued2017-02-15en
dc.identifier.citationRezki Z, Zorgui M, Alomair B, Alouini M-S (2017) Secret Key Agreement: Fundamental Limits and Practical Challenges. IEEE Wireless Communications: 2–9. Available: http://dx.doi.org/10.1109/mwc.2017.1500365wc.en
dc.identifier.issn1536-1284en
dc.identifier.doi10.1109/mwc.2017.1500365wcen
dc.identifier.urihttp://hdl.handle.net/10754/623187-
dc.description.abstractDespite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.en
dc.description.sponsorshipThis work has been supported by a grant from King Abdulaziz City of Science and Technology (KACST), Riyadh, Saudi Arabia.en
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en
dc.relation.urlhttp://ieeexplore.ieee.org/document/7856875/en
dc.titleSecret Key Agreement: Fundamental Limits and Practical Challengesen
dc.typeArticleen
dc.contributor.departmentComputer, Electrical and Mathematical Sciences and Engineering (CEMSE) Divisionen
dc.contributor.departmentElectrical Engineering Programen
dc.identifier.journalIEEE Wireless Communicationsen
dc.contributor.institutionUniversity of Idahoen
dc.contributor.institutionUniversity of California at Irvineen
dc.contributor.institutionNational Center for Cybersecurity Technology (C4C)en
kaust.authorAlouini, Mohamed-Slimen
All Items in KAUST are protected by copyright, with all rights reserved, unless otherwise indicated.