dc.contributor.author | Vía Rodríguez, Javier | |
dc.contributor.other | Universidad de Cantabria | es_ES |
dc.date.accessioned | 2017-01-09T14:15:11Z | |
dc.date.available | 2017-01-09T14:15:11Z | |
dc.date.issued | 2014 | |
dc.identifier.isbn | 978-1-4799-2894-1 | |
dc.identifier.isbn | 978-1-4799-2893-4 | |
dc.identifier.isbn | 978-1-4799-2892-7 | |
dc.identifier.other | TEC2010-19545-C04-03 | es_ES |
dc.identifier.other | CSD2008-00010 | es_ES |
dc.identifier.uri | http://hdl.handle.net/10902/9940 | |
dc.description.abstract | This paper considers the problem of distilling a secret key in a Gaussian multiple-input multiple-output (MIMO) scenario with two legitimate nodes and an eavesdropper. Focusing on the realistic case without perfect knowledge of the eavesdropper channel, and following a conservative practical approach based on the maximization of the worst case secret key capacity (SKC), the problem of designing the optimal transmit covariance matrix is reformulated as a convex optimization problem. In the limiting case in which the eavesdropper channel can not be estimated, or when the estimate is highly unreliable, the optimal covariance matrix can be obtained by means of waterfilling or matched filtering like algorithms. Additionally, we illustrate the benefits of allowing time sharing between transmissions of the two legitimate nodes, and provide an efficient algorithm for obtaining the optimal transmit covariance matrices and time-sharing factor. | es_ES |
dc.description.sponsorship | This work was supported by the Spanish Government, Ministerio de Ciencia e Innovación (MICINN), under projects COSIMA (TEC2010-19545-C04-03) and COMONSENS (CSD2008-00010, CONSOLIDER INGENIO 2010 Program). | es_ES |
dc.format.extent | 5 p. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | IEEE | es_ES |
dc.rights | © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | es_ES |
dc.source | IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014), Florence, Italy, 2014, 8178-8182 | es_ES |
dc.subject.other | Secret Key Capacity (SKC) | es_ES |
dc.subject.other | Induced Source Model | es_ES |
dc.subject.other | Multiple-Input Multiple-Output (MIMO) | es_ES |
dc.subject.other | Robust Design | es_ES |
dc.subject.other | Time-Sharing, S-Procedure | es_ES |
dc.title | Robust secret key capacity for the MIMO induced source model | es_ES |
dc.type | info:eu-repo/semantics/conferenceObject | es_ES |
dc.relation.publisherVersion | https://doi.org/10.1109/ICASSP.2014.6855195 | es_ES |
dc.rights.accessRights | openAccess | es_ES |
dc.identifier.DOI | 10.1109/ICASSP.2014.6855195 | |
dc.type.version | acceptedVersion | es_ES |