Research Repository

Overcoming limitations of secret key generation in block fading channels under active attacks

Chorti, A (2016) Overcoming limitations of secret key generation in block fading channels under active attacks. In: UNSPECIFIED, ? - ?.

Full text not available from this repository.

Abstract

© 2016 IEEE. The topic of physical layer key agreement in Gaussian block fading channels in the presence of active adversaries is investigated in the present contribution. Frequency hopping versus frequency spreading are studied as potential defence strategies against denial of service (DoS) attacks in the form of jamming. We begin by investigating the optimal power allocation policy for the jammer - in the case of frequency spreading - when side information is available. Through numerical evaluations it is shown that effect of the availability of side information on the jammer's impact is minimal. Next, the competitive interaction between the legitimate nodes and the jammer is formulated as a one-shot zero-sum game; it is found that under short term power constraints, the legitimate nodes should not always employ frequency hopping while the jammer should always use frequency spreading. This result contradicts the common practice of using frequency hopping to defend against jamming attacks in standard wireless systems.

Item Type: Conference or Workshop Item (Paper)
Additional Information: Published proceedings: IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Science and Health > Computer Science and Electronic Engineering, School of
Depositing User: Jim Jamieson
Date Deposited: 12 Dec 2016 16:32
Last Modified: 17 Aug 2017 17:20
URI: http://repository.essex.ac.uk/id/eprint/18483

Actions (login required)

View Item View Item