메뉴 건너뛰기




Volumn 30, Issue 9, 2012, Pages 1666-1674

Cooperative secret key generation from phase estimation in narrowband fading channels

Author keywords

cooperative networking; Key generation; maximum likelihood estimation; multipath channel; single tone estimation; wireless network

Indexed keywords

COMMON RANDOMNESS; COOPERATIVE NETWORKING; CORRELATED OBSERVATIONS; ESTIMATION METHODS; ESTIMATION THEORY; HIGH RATE; KEY BITS; KEY GENERATION; KEY GENERATION PROTOCOLS; KEY GENERATION RATE; LIKELIHOOD ESTIMATION; MUTUAL INFORMATIONS; NARROW BANDS; NODE MOBILITY; NUMERICAL EXAMPLE; ORDERS OF MAGNITUDE; PHASE ESTIMATION; PHYSICAL LAYERS; RANDOM SOURCES; RELAY NODE; SECRET KEY; SIMULATION STUDIES; STATE OF THE ART; UPPER BOUND;

EID: 84866898821     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2012.121010     Document Type: Article
Times cited : (121)

References (16)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 77951458752 scopus 로고    scopus 로고
    • Information-theoretically secure secret-key agreement by not authenticated public discussion
    • U. M. Maurer, "Information-theoretically secure secret-key agreement by not authenticated public discussion," in Proc. of EUROCRYPT'97, 1997, pp. 209-225.
    • (1997) Proc. of EUROCRYPT'97 , pp. 209-225
    • Maurer, U.M.1
  • 3
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels i: Definitions and a completeness result
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels i: Definitions and a completeness result," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 4
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-i: Secret sharing
    • R. Ahlswede and I. Csisźar, "Common randomness in information theory and cryptography-i: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csisźar, I.2
  • 6
    • 60149088258 scopus 로고    scopus 로고
    • Robust key generation from signal envelopes in wireless networks
    • B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. of CCS'07, 2007, pp. 401-410.
    • (2007) Proc. of CCS'07 , pp. 401-410
    • Azimi-Sadjadi, B.1    Kiayias, A.2    Mercado, A.3    Yener, B.4
  • 7
    • 60149097098 scopus 로고    scopus 로고
    • Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in Proc. MobiCom'08, 2008, pp. 128-139.
    • (2008) Proc. MobiCom'08 , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 8
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in Proc. MobiCom'09, 2009, pp. 321-332.
    • (2009) Proc. MobiCom'09 , pp. 321-332
    • Jana, S.1    Premnath, S.N.2    Clark, M.3    Kasera, S.K.4    Patwari, N.5    Krishnamurthy, S.V.6
  • 11
    • 0016102201 scopus 로고
    • Single-tone parameter estimation from discrete-time observations
    • Sep.
    • D. Rife and R. Boorstyn, "Single-tone parameter estimation from discrete-time observations," IEEE Trans. Inf. Theory, vol. 20, no. 5, pp. 591-598, Sep. 1974.
    • (1974) IEEE Trans. Inf. Theory , vol.20 , Issue.5 , pp. 591-598
    • Rife, D.1    Boorstyn, R.2
  • 12
    • 67650671123 scopus 로고    scopus 로고
    • Key agreement from close secrets over unsecured channels
    • B. Kanukurthi and L. Reyzin, "Key agreement from close secrets over unsecured channels," in Proc. of EUROCRYPT'09, 2009, pp. 206-223.
    • (2009) Proc. of EUROCRYPT'09 , pp. 206-223
    • Kanukurthi, B.1    Reyzin, L.2
  • 13
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal of Computing, vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM Journal of Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 14
    • 76249088301 scopus 로고    scopus 로고
    • A unified framework for key agreement over wireless fading channels
    • L. Lai and H. V. Poor, "A unified framework for key agreement over wireless fading channels," in IEEE Information Theory Workshop (ITW), 2009, pp. 100-104.
    • (2009) IEEE Information Theory Workshop (ITW) , pp. 100-104
    • Lai, L.1    Poor, H.V.2
  • 15
    • 84866891866 scopus 로고    scopus 로고
    • Cooperative secret key generation from phase estimation in narrowband fading channels
    • September
    • Q. Wang, K. Xu, and K. Ren, "Cooperative secret key generation from phase estimation in narrowband fading channels," Illinois Institute of Technology, Chicago, IL, Tech. Rep., September 2011, http://arxiv.org/abs/1109. 0766.
    • (2011) Illinois Institute of Technology, Chicago, IL, Tech. Rep.
    • Wang, Q.1    Xu, K.2    Ren, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.