The National Academies Logo
Research Associateship Programs
Fellowships Office
Policy and Global Affairs

Participating Agencies - ARL/USMA

  Sign InPrintable View

Opportunity at Davies Teaching Fellowships (ARL/USMA)

Secure Communications for Highly Dynamic Networks


MD and NM-Computational and Information Sciences-FFP, Computational and Information Sciences Directorate - FFP

RO# Location
AA.36.02.B8245 Adelphi, MD 207831197


Name E-mail Phone
Sadler, Brian M. 301.394.1239
Yu, Paul 301 394 1722


We consider the design of information-theoretically secure techniques for key management (i.e., generation/agreement and replacement/update) over stochastic channels. Such keys may be used to enable secure communications over otherwise insecure and open channels. As such, we consider the agreement (update) of a secret key as a proxy for the establishment (maintenance) of secure communications. This problem space is relevant for networks whose communication links have unreliable quality or availability (e.g., tactical mobile ad-hoc networks). In such environments, existing key management techniques such as public key servers or key pre-distribution become too expensive, risky, or slow.

The thrusts of this research are as follows: (1) the characterization of the tradeoff space between key agreement rate, secrecy, and delay; (2) the analysis of the division of fresh entropy across key agreement and key update; and (3) techniques for key agreement and update over a network with highly-constrained channels.

An interesting opportunity arises in noisy channels because the requirements for perfect secrecy are different than those for noiseless channels. In fact, it has been shown that as long as the channels to the friendly and attacker parties are different, it is possible to agree on a key that is perfectly secret from the attacker. This secret key may then be used in a variety ways such as enabling perfectly secret communication (e.g., in a one-time pad) or authenticating over open channels (e.g., fingerprinting). One of the major obstacles in applying these concepts for tactical networks is the need for many rounds of communications over an open channel. For the networks of interest, this open channel has limited availability and bandwidth.



Verma G, Yu P, Sadler B: Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios. IEEE Access 3: 81-88, 2015

Yu P, Sadler B, Verma G: Wireless Physical Layer Authentication via Fingerprint Embedding. IEEE Communications Magazine, Special issue: Wireless Physical Layer Security: 48-53, Jun 2015

Yu PL, Sadler BM: MIMO Authentication via Deliberate Fingerprinting at the Physical Layer. IEEE Transactions on Information Forensics and Security, Special Issue: Physical-Layer Security (6)3: 606-615, September 2011


Communications; Networks; Information theory; cryptography; Information forensics; Security;


Citizenship:  Open to U.S. citizens
Level:  Open to Postdoctoral applicants
Copyright © 2014. National Academy of Sciences. All rights reserved. 500 Fifth St. N.W., Washington, D.C. 20001.
Terms of Use and Privacy Statement.