메뉴 건너뛰기




Volumn , Issue , 2008, Pages 125-131

Reverse piloting protocol for securing time varying wireless channels

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; COMPUTER NETWORKS; CRYPTOGRAPHY; ENERGY POLICY; FADING CHANNELS; RAYLEIGH FADING; SENSOR NETWORKS; SIGNAL RECEIVERS; SIGNALING; TELECOMMUNICATION; TELECOMMUNICATION SYSTEMS; TRANSMITTERS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 51249094766     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WTS.2008.4547555     Document Type: Conference Paper
Times cited : (9)

References (25)
  • 1
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 2
    • 84900358192 scopus 로고    scopus 로고
    • U.S. National Bureau of Standards (NBS) Data Encryption Standard, Federal Information Processing Standards Publication 46 (FIPS-46), 1977.
    • U.S. National Bureau of Standards (NBS) "Data Encryption Standard," Federal Information Processing Standards Publication 46 (FIPS-46), 1977.
  • 5
    • 33646382089 scopus 로고    scopus 로고
    • A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
    • Feb
    • N. R. Potlapally, S. Ravi, A. Raghunath and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 128-143, Feb. 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunath, A.3    Jha, N.K.4
  • 9
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. Wyner, "The wire-tap channel," Bell Systems Technical Journal, vol. 54, no. 8, pp. 1355-1387, 1975.
    • (1975) Bell Systems Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1
  • 11
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 12
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • A. O. Hero, III, "Secure space-time communication," IEEE Transactions on Information Theory, vol. 49, no. 12, pp. 3235-3249, 2003.
    • (2003) IEEE Transactions on Information Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero III, A.O.1
  • 13
    • 44049105403 scopus 로고    scopus 로고
    • On the Secrecy Capacity of Fading Channels
    • Unpublished, at www.ece.osu.edu/̃helgamal
    • P. K. Gopala, L. Lai and H. El Gamal, "On the Secrecy Capacity of Fading Channels," Unpublished. (at www.ece.osu.edu/̃helgamal).
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 16
    • 60149088258 scopus 로고    scopus 로고
    • B. Azimi-Sadjadi, A. Kiayias, A. Mercado and B. Yener Robust key generation from signal envelopes in wireless networks, to appear in 14th ACM Conference on Computer and Communications Security (CCS), 2007.
    • B. Azimi-Sadjadi, A. Kiayias, A. Mercado and B. Yener "Robust key generation from signal envelopes in wireless networks," to appear in 14th ACM Conference on Computer and Communications Security (CCS), 2007.
  • 17
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Transactions on Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, 2005.
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 18
  • 19
    • 84863732923 scopus 로고    scopus 로고
    • A physical transmission security layer for wireless multiple access communication systems
    • Sep
    • G. R. Tsouri and D. Wulich, "A physical transmission security layer for wireless multiple access communication systems," European Signal Processing Conference (EUSIPCO), Sep. 2007.
    • (2007) European Signal Processing Conference (EUSIPCO)
    • Tsouri, G.R.1    Wulich, D.2
  • 21
    • 15344345377 scopus 로고    scopus 로고
    • Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications
    • IEEE, November
    • IEEE, Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Standard 802.16e, November 2005
    • (2005) IEEE Standard 802.16e
  • 22
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Systems Technical Journal, vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell Systems Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 24
    • 84900372545 scopus 로고    scopus 로고
    • A. Viterbi, Principles of Coherent Communication, McGraw-Hill, 1966.
    • A. Viterbi, Principles of Coherent Communication, McGraw-Hill, 1966.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.