메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Exploiting multiple-antenna diversity for shared secret key generation in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

802.11N; ANTENNA SYSTEM; GENERATION RATE; KEY GENERATION; KEY GENERATOR; MOBILE ENVIRONMENTS; MULTI-LEVEL; MULTIPLE ANTENNA; MUTUAL INFORMATIONS; REAL ENVIRONMENTS; RECEIVED SIGNAL STRENGTH INDICATORS; SECRET KEY; SHARED SECRETS; WIRELESS FADING CHANNELS;

EID: 77953297543     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462004     Document Type: Conference Paper
Times cited : (218)

References (21)
  • 4
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels.I. definitions and a completeness result
    • April
    • U. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels .I. definitions and a completeness result," Information Theory, IEEE Transactions on, vol. 49, no. 4, pp. 822-831, April 2003.
    • (2003) Information Theory, IEEE Transactions on , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.1    Wolf, S.2
  • 5
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM Journal on Computing, vol. 26, pp. 1484-1509, 1997.
    • (1997) SIAM Journal on Computing , vol.26 , pp. 1484-1509
    • Shor, P.W.1
  • 6
    • 70349883977 scopus 로고    scopus 로고
    • Key generation exploiting mimo channel evolution: Algorithm and theoretical limits
    • European Association on Antennas and Propagation
    • J. W. Wallace, C. Chen, and M. A. Jensen, "Key generation exploiting mimo channel evolution: algorithm and theoretical limits," in Proceedings of 3rd European Conference on Antennas and Propagation. European Association on Antennas and Propagation, 2009.
    • (2009) Proceedings of 3rd European Conference on Antennas and Propagation
    • Wallace, J.W.1    Chen, C.2    Jensen, M.A.3
  • 7
    • 0033881606 scopus 로고    scopus 로고
    • Secure information transmission for mobile radio
    • Feburary
    • H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Communications Letters, vol. 4, no. 2, pp. 52-55, Feburary 2000.
    • (2000) IEEE Communications Letters , vol.4 , Issue.2 , pp. 52-55
    • Koorapaty, H.1    Hassan, A.2    Chennakeshu, S.3
  • 8
    • 33947126657 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels: RSSI interleaving scheme
    • October
    • T. Aono, K. Higuchi, M. Taromaru, T. Ohira, and H. Sasaoka, "Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels : RSSI interleaving scheme," Wireless Technology, 2005. The European Conference on, pp. 173-176, October 2005.
    • (2005) Wireless Technology, 2005 the European Conference on , pp. 173-176
    • Aono, T.1    Higuchi, K.2    Taromaru, M.3    Ohira, T.4    Sasaoka, H.5
  • 11
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 13
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • C. Cachin and U. M. Maurer, "Linking information reconciliation and privacy amplification," Journal of Cryptology, vol. 10, pp. 97-110, 1997.
    • (1997) Journal of Cryptology , vol.10 , pp. 97-110
    • Cachin, C.1    Maurer, U.M.2
  • 17
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol. 17, no. 2, pp. 210-229, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 18
    • 0037356065 scopus 로고    scopus 로고
    • Distributed source coding using syndromes (discus): Design and construction
    • Mar
    • S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (discus): design and construction," Information Theory, IEEE Transactions on, vol. 49, no. 3, pp. 626-643, Mar 2003.
    • (2003) Information Theory, IEEE Transactions on , vol.49 , Issue.3 , pp. 626-643
    • Pradhan, S.1    Ramchandran, K.2
  • 19
    • 0026015905 scopus 로고
    • Approximate entropy as a measure of system complexity
    • National Academy of Sciences of the USA, March
    • S. M. Pincus, "Approximate entropy as a measure of system complexity," in Proceedings of the National Academy of Sciences of the USA. National Academy of Sciences of the USA, March 1991, pp. 2297-2301.
    • (1991) Proceedings of the National Academy of Sciences of the USA , pp. 2297-2301
    • Pincus, S.M.1
  • 20
    • 39749164774 scopus 로고    scopus 로고
    • Estimating mutual information
    • Jun
    • A. Kraskov, H. Stögbauer, and P. Grassberger, "Estimating mutual information," Phys. Rev. E, vol. 69, no. 6, p. 066138, Jun 2004.
    • (2004) Phys. Rev. E , vol.69 , Issue.6 , pp. 066138
    • Kraskov, A.1    Stögbauer, H.2    Grassberger, P.3
  • 21
    • 38549124508 scopus 로고    scopus 로고
    • Fingerprints in the ether: Using the physical layer for wireless authentication
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in the ether: Using the physical layer for wireless authentication," in IEEE ICC'07, 2007, pp. 4646-4651.
    • (2007) IEEE ICC'07 , pp. 4646-4651
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.