메뉴 건너뛰기




Volumn , Issue , 2012, Pages 927-935

Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION RANGE; GENERATION RATE; GROUP KEY; INDOOR ENVIRONMENT; KEY GENERATION; MOBILE SCENARIOS; MOBILE WIRELESS; MOBILE WIRELESS NETWORK; MULTIPLE DEVICES; PHYSICAL LAYERS; RADIO CHANNELS; RECEIVED SIGNAL STRENGTH; RELAY NODE; SECRET KEY; SECURE GROUP COMMUNICATIONS; SHADOW FADING; WIRELESS DEVICES; WIRELESS INFRASTRUCTURES; WIRELESS MOBILE NETWORKS;

EID: 84861623350     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195843     Document Type: Conference Paper
Times cited : (142)

References (21)
  • 1
    • 60149088258 scopus 로고    scopus 로고
    • Robust key generation from signal envelopes in wireless networks
    • B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in ACM CCS, 2007, pp. 401-410.
    • (2007) ACM CCS , pp. 401-410
    • Azimi-Sadjadi, B.1    Kiayias, A.2    Mercado, A.3    Yener, B.4
  • 2
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Transactions on Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, 2005.
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 3
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in ACM MobiCom, 2009, pp. 321-332.
    • (2009) ACM MobiCom , pp. 321-332
    • Jana, S.1    Premnath, S.2    Clark, M.3    Kasera, S.4    Patwari, N.5    Krishnamurthy, S.6
  • 4
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-telepathy: extracting a secret key from an unauthenticated wireless channel," in ACM MobiCom, 2008, pp. 128-139.
    • (2008) ACM MobiCom , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 5
    • 51449114762 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in IEEE ICASSP, 2008, pp. 3013-3016.
    • (2008) IEEE ICASSP , pp. 3013-3016
    • Sayeed, A.1    Perrig, A.2
  • 6
    • 79960885380 scopus 로고    scopus 로고
    • Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
    • Q. Wang, H. Su, K. Ren, and K. Kim, "Fast and scalable secret key generation exploiting channel phase randomness in wireless networks,"in IEEE INFOCOM, 2011.
    • (2011) IEEE INFOCOM
    • Wang, Q.1    Su, H.2    Ren, K.3    Kim, K.4
  • 7
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,"IEEE Transactions on Mobile Computing, pp. 17-30, 2009.
    • (2009) IEEE Transactions on Mobile Computing , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.4
  • 8
    • 77954527646 scopus 로고    scopus 로고
    • Robust uncorrelated bit extraction methodologies for wireless sensors
    • J. Croft, N. Patwari, and S. Kasera, "Robust uncorrelated bit extraction methodologies for wireless sensors," in ACM/IEEE ICNP, 2010, pp. 70-81.
    • (2010) ACM/IEEE ICNP , pp. 70-81
    • Croft, J.1    Patwari, N.2    Kasera, S.3
  • 9
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • K. Zeng, D. Wu, A. Chan, and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks,"in IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) IEEE INFOCOM , pp. 1-9
    • Zeng, K.1    Wu, D.2    Chan, A.3    Mohapatra, P.4
  • 10
    • 77952329424 scopus 로고    scopus 로고
    • Secret keys from entangled sensor motes: Implementation and analysis
    • M. Wilhelm, I. Martinovic, and J. Schmitt, "Secret keys from entangled sensor motes: implementation and analysis," in ACM Wisec, 2010, pp. 139-144.
    • (2010) ACM Wisec , pp. 139-144
    • Wilhelm, M.1    Martinovic, I.2    Schmitt, J.3
  • 13
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 364-375, 2007.
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.3
  • 14
    • 79957865221 scopus 로고    scopus 로고
    • Unconditionally secure communications over fading channels
    • M. Tope and J. McEachen, "Unconditionally secure communications over fading channels," in IEEE MILCOM, 2001.
    • (2001) IEEE MILCOM
    • Tope, M.1    McEachen, J.2
  • 17
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly gaussian random variables
    • C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly gaussian random variables," in IEEE ISIT, 2006, pp. 2593-2597.
    • (2006) IEEE ISIT , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 18
    • 84923996598 scopus 로고    scopus 로고
    • New York, NY, USA: Cambridge University Press
    • A. Goldsmith, Wireless Communications. New York, NY, USA: Cambridge University Press, 2005.
    • (2005) Wireless Communications
    • Goldsmith, A.1
  • 21
    • 0004089464 scopus 로고    scopus 로고
    • 3rd ed. Secaucus, NJ, USA: Springer-Verlag New York, Inc.
    • J. H. V. Lint, Introduction to Coding Theory, 3rd ed. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 1998.
    • (1998) Introduction to Coding Theory
    • Lint, J.H.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.