메뉴 건너뛰기




Volumn 18, Issue 4, 2011, Pages 6-12

Secret key generation exploiting channel characteristics in wireless communications

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL CHARACTERISTICS; CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC COMPUTATIONS; DISAGREEMENT PROBABILITY; KEY GENERATION; KEY GENERATION RATE; PERFORMANCE COMPARISON; PUBLIC KEY INFRASTRUCTURE; SECRET KEY; SECURITY SCHEME; SHARED SECRETS; WIRELESS CHANNEL; WIRELESS COMMUNICATIONS; WIRELESS FADING CHANNELS;

EID: 80052337836     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2011.5999759     Document Type: Article
Times cited : (220)

References (15)
  • 1
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis et al., "Fuzzy Extractors: How to Generate Strong Keys From Biometrics and Other Noisy Data," SIAM J. Comp., vol. 38, no. 1, 2008, pp. 97-139.
    • (2008) SIAM J. Comp. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1
  • 2
    • 67650671123 scopus 로고    scopus 로고
    • Key agreement from close secrets over unsecured channels
    • Apr.
    • B. Kanukurthi and L. Reyzin, "Key Agreement from Close Secrets Over Unsecured Channels," Proc. EUROCRYPT '09, Apr. 2009, pp. 206-23.
    • (2009) Proc. EUROCRYPT '09 , pp. 206-223
    • Kanukurthi, B.1    Reyzin, L.2
  • 3
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication Theory of Secrecy Systems," Bell Sys. Tech. J., vol. 28, no. 4, 1949, pp. 656-715.
    • (1949) Bell Sys. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 4
    • 77951458752 scopus 로고    scopus 로고
    • Information-theoretically secure secret- key agreement by not authenticated public discussion
    • May
    • U. M. Maurer, "Information-Theoretically Secure Secret- Key Agreement by Not Authenticated Public Discussion," Proc. EURO-CRYPT '97, May 1997, pp. 209-25.
    • (1997) Proc. EURO-CRYPT '97 , pp. 209-225
    • Maurer, U.M.1
  • 6
    • 60149088258 scopus 로고    scopus 로고
    • Robust key generation from signal envelopes in wireless networks
    • Oct.
    • B. Azimi-Sadjadi et al., "Robust Key Generation from Signal Envelopes in Wireless Networks," Proc. CCS '07, Oct. 2007, pp. 401-10.
    • (2007) Proc. CCS '07 , pp. 401-410
    • Azimi-Sadjadi, B.1
  • 7
    • 60149097098 scopus 로고    scopus 로고
    • Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
    • Sept.
    • S. Mathur et al., "Radiotelepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel," Proc. MobiCom '08, Sept. 2008, pp. 128-39.
    • (2008) Proc. MobiCom '08 , pp. 128-139
    • Mathur, S.1
  • 8
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • Sept.
    • S. Jana et al., "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. MobiCom '09, Sept. 2009, pp. 321-32.
    • (2009) Proc. MobiCom '09 , pp. 321-332
    • Jana, S.1
  • 9
    • 79960885380 scopus 로고    scopus 로고
    • Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
    • Apr.
    • Q. Wang et al., "Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks," Proc. IEEE INFOCOM '11, Apr. 2011.
    • (2011) Proc. IEEE INFOCOM '11
    • Wang, Q.1
  • 11
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • N. Patwari et al., "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Comp., vol. 9, no. 1, 2010, pp. 17-30.
    • (2010) IEEE Trans. Mobile Comp. , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1
  • 12
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • Mar.
    • K. Zeng et al., "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," Proc. INFOCOM '10, Mar. 2010, pp. 1837-45.
    • (2010) Proc. INFOCOM '10 , pp. 1837-1845
    • Zeng, K.1
  • 13
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • N. Patwari et al., "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Comp., vol. 9, no. 1, 2010, pp. 17-30.
    • (2010) IEEE Trans. Mobile Comp. , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1
  • 14
    • 51449114762 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • Mar.
    • A. M. Sayeed and A. Perrig, "Secure Wireless Communications: Secret Keys through Multipath," Proc. ICASSP '08, Mar. 2008, pp. 321-32.
    • (2008) Proc. ICASSP '08 , pp. 321-332
    • Sayeed, A.M.1    Perrig, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.