메뉴 건너뛰기




Volumn 6, Issue 3 PART 1, 2011, Pages 737-751

Keys through ARQ: Theory and practice

Author keywords

Automatic repeat request (ARQ) key sharing; IEEE 802.11 Security; intrusion detection; physical layer security

Indexed keywords

ACHIEVABILITY; ADAPTIVE RATE; AUTOMATIC REPEAT REQUEST PROTOCOLS; CORRELATED CHANNELS; EXPLICIT CONSTRUCTIONS; IEEE 802.11 STANDARDS; IEEE 802.11S; IMPLEMENTATION COMPLEXITY; INFORMATION-THEORETIC LIMITS; KEY SHARING; MEDIUM ACCESS LAYER; NEGATIVE IMPACTS; NUMERICAL RESULTS; PHYSICAL LAYER SECURITY; SECRET KEY; SET-UP TIME; SPATIAL AND TEMPORAL CORRELATION; SPATIAL CORRELATIONS; THEORETICAL FOUNDATIONS; THEORY AND PRACTICE; UNIFIED FRAMEWORK; WI FI NETWORKS;

EID: 80051755314     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2123093     Document Type: Article
Times cited : (31)

References (30)
  • 1
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Jan
    • A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 44049101918 scopus 로고    scopus 로고
    • On the achievable secrecy throughput of block fading channels with no channel state information at transmitter
    • DOI 10.1109/CISS.2007.4298441, 4298441, Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings
    • X. Tang, R. Liu, and P. Spasojevic, "On the achievable secrecy throughput of block fading channels with no channel state information at transmitter", in Proc. CISS'07, Mar. 2007, pp. 917-922. (Pubitemid 351710550)
    • (2007) Forty-first Annual Conference on Information Sciences and Systems, CISS 2007 - Proceedings , pp. 917-922
    • Tang, X.1    Liu, R.2    Spasojevic, P.3
  • 4
    • 70449501021 scopus 로고    scopus 로고
    • On the throughput of secure hybrid ARQ protocols for gaussian block-fading channels
    • Jun
    • X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "On the throughput of secure hybrid ARQ protocols for gaussian block-fading channels", in Proc. ISIT 2007, Jun. 2007, pp. 1355-1387.
    • (2007) Proc. ISIT 2007 , pp. 1355-1387
    • Tang, X.1    Liu, R.2    Spasojevic, P.3    Poor, H.V.4
  • 6
    • 77953313388 scopus 로고    scopus 로고
    • Secure wireless communication with dynamic secrets
    • Mar. 14-19
    • S. Xiao, W. Gong, and D. Towsley, "Secure wireless communication with dynamic secrets", in Proc. IEEE INFOCOM, 2010, Mar. 14-19, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM, 2010 , pp. 1-9
    • Xiao, S.1    Gong, W.2    Towsley, D.3
  • 14
    • 57749184596 scopus 로고    scopus 로고
    • Improved nonce construction scheme for AES CCMP to evade initial counter prediction
    • Aug. 6-8
    • M. A. Khan, A. R. Cheema, and A. Hasan, "Improved nonce construction scheme for AES CCMP to evade initial counter prediction", in Proc. SNPD'08, Aug. 6-8, 2008, pp. 307-311.
    • (2008) Proc. SNPD'08 , pp. 307-311
    • Khan, M.A.1    Cheema, A.R.2    Hasan, A.3
  • 15
    • 0036611602 scopus 로고    scopus 로고
    • Opportunistic beamforming using dumb antennas
    • DOI 10.1109/TIT.2002.1003822, PII S0018944802040099
    • P. Viswanath, D. Tse, and R. Laroia, "Opportunistic beamforming using dumb antennas", IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1277-1294, Jun. 2002. (Pubitemid 34759845)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.6 , pp. 1277-1294
    • Viswanath, P.1    Tse, D.N.C.2    Laroia, R.3
  • 17
    • 73149122953 scopus 로고    scopus 로고
    • Rate adaptation via link-layer feedback for goodput maximization over a time-varying channel
    • R. Aggarwal, P. Schniter, and C. E. Koksal, "Rate adaptation via link-layer feedback for goodput maximization over a time-varying channel", Trans. Wireless Commun., vol. 8, no. 8, pp. 4276-4285, 2009.
    • (2009) Trans. Wireless Commun. , vol.8 , Issue.8 , pp. 4276-4285
    • Aggarwal, R.1    Schniter, P.2    Koksal, C.E.3
  • 18
    • 0021595510 scopus 로고
    • The wire-tap channel II
    • L. H. Ozarow and A. D. Wyner, "The wire-tap channel II", Bell Syst. Tech. J., vol. 63, no. 10, pp. 2135-2157, 1984.
    • (1984) Bell Syst. Tech. J. , vol.63 , Issue.10 , pp. 2135-2157
    • Ozarow, L.H.1    Wyner, A.D.2
  • 23
    • 38549119395 scopus 로고    scopus 로고
    • KoreK, Online. Available
    • Kore K, Next Generation of WEP Attacks 2004 [Online]. Available: http://www.netstumbler.org/showpost.php?p=93942&postcount=35
    • Next Generation of WEP Attacks 2004
  • 24
    • 47749085463 scopus 로고    scopus 로고
    • Attacks on the RC4 stream cipher
    • Sep, Online. Available
    • A. Klein, "Attacks on the RC4 stream cipher", Designs, Codes, Cryptography vol. 48, no. 3, pp. 269-286, Sep. 2008 [Online]. Available: http://www.springerlink.com/content/6086867367826646
    • (2008) Designs, Codes, Cryptography , vol.48 , Issue.3 , pp. 269-286
    • Klein, A.1
  • 25
    • 34548283237 scopus 로고    scopus 로고
    • The final nail in WEP's coffin
    • May 21-24, 400
    • A. Bittau, M. Handley, and J. Lackey, "The final nail in WEP's coffin", in Proc. ISSP'06, May 21-24, 2006, pp. 15, 400.
    • (2006) Proc. ISSP'06 , pp. 15
    • Bittau, A.1    Handley, M.2    Lackey, J.3
  • 30
    • 84907522342 scopus 로고    scopus 로고
    • Improving wireless security through network diversity
    • Dec, Online. Available
    • T. Ye, D. Veitch, and J. Bolot, "Improving wireless security through network diversity", SIGCOMM Comput. Commun. Rev. vol. 39, pp. 34-44, Dec. 2008 [Online]. Available: http://doi.acm.org/10.1145/1496091.1496096
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.39 , pp. 34-44
    • Ye, T.1    Veitch, D.2    Bolot, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.