메뉴 건너뛰기




Volumn 20, Issue 5, 2012, Pages 1440-1451

Limitations of generating a secret key using wireless fading under active adversary

Author keywords

Active adversary; channel fading; jamming; secret key; wireless security

Indexed keywords

ACTIVE ADVERSARY; ADVERSARY MODELS; ANALYTICAL RESULTS; COMMUNICATION COST; EFFICIENT PROCESS; KEY EXCHANGE; RESEARCH STUDIES; SECRET KEY; SHARED SECRETS; SIGNAL POWER; WIRELESS CHANNEL; WIRELESS SECURITY; WORKING SYSTEMS;

EID: 84867755583     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2012.2183146     Document Type: Article
Times cited : (54)

References (32)
  • 1
    • 60149088258 scopus 로고    scopus 로고
    • Robust key generation from signal envelopes in wireless networks
    • B. A-Sadjadi, A. Kiayias,A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in Proc. ACM CCS, 2007, pp. 401-410.
    • (2007) Proc. ACM CCS , pp. 401-410
    • A-Sadjadi, B.1    Kiayiasa. Mercado, A.2    Yener, B.3
  • 2
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strengths in real environments
    • Sep.
    • S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strengths in real environments," in Proc. ACM MobiCom, Sep. 2009, pp. 321-332.
    • (2009) Proc. ACM MobiCom , pp. 321-332
    • Jana, S.1    Premnath, S.2    Clark, M.3    Kasera, S.4    Patwari, N.5    Krishnamurthy, S.6
  • 3
    • 60149097098 scopus 로고    scopus 로고
    • Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
    • Sep.
    • S. Mathur,W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. ACM MobiCom, Sep. 2008, pp. 128-139.
    • (2008) Proc. ACM MobiCom , pp. 128-139
    • Mathurw. Trappe, S.1    Mandayam, N.2    Ye, C.3    Reznik, A.4
  • 4
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • Mar.
    • K. Zeng, D.Wu, A. Chan, and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Zeng, K.1    Wu, D.2    Chan, A.3    Mohapatra, P.4
  • 5
    • 51449114762 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • Apr.
    • A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in Proc. IEEE ICASSP, Apr. 2008, pp. 3013-3016.
    • (2008) Proc. IEEE ICASSP , pp. 3013-3016
    • Sayeed, A.1    Perrig, A.2
  • 6
    • 52349107260 scopus 로고    scopus 로고
    • A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property
    • S. Yasukawa, H. Iwai, and H. Sasaoka, "A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property," in Proc. IEEE ISIT, 2008, pp. 732-736.
    • (2008) Proc. IEEE ISIT , pp. 732-736
    • Yasukawa, S.1    Iwai, H.2    Sasaoka, H.3
  • 7
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • DOI 10.1109/TIFS.2007.902666
    • R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 364-375, Sep. 2007. (Pubitemid 47290572)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 8
    • 70449479022 scopus 로고    scopus 로고
    • Secure physical layer key generation schemes: Performance and information theoretic limits
    • Jun.
    • J.W.Wallace, "Secure physical layer key generation schemes: Performance and information theoretic limits," in Proc. IEEE ICC, Jun. 2009, pp. 1-5.
    • (2009) Proc. IEEE ICC , pp. 1-5
    • Wallace, J.W.1
  • 9
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • DOI 10.1109/TAP.2005.858853
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 10
    • 77949631620 scopus 로고    scopus 로고
    • A note on information-theoretic secret key exchange over wireless channels
    • Control, Comput., Monticello IL
    • M. Zafer, D. Agrawal, and M. Srivatsa, "A note on information-theoretic secret key exchange over wireless channels," in Proc. 47th Allerton Conf. Commun., Control, Comput., Monticello, IL, 2009, pp. 754-761.
    • (2009) Proc. 47th Allerton Conf. Commun. , pp. 754-761
    • Zafer, M.1    Agrawal, D.2    Srivatsa, M.3
  • 11
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 12
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography-Part I: Secret sharing
    • Jul.
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 13
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 15
    • 60449113417 scopus 로고    scopus 로고
    • Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
    • Y.W. Law,M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," Trans. Sensor Netw., vol. 5, no. 1, p. 6, 2009.
    • (2009) Trans. Sensor Netw. , vol.5 , Issue.1 , pp. 6
    • Law, Y.W.1    Palaniswami, M.2    Hoesel, L.V.3    Doumen, J.4    Hartel, P.5    Havinga, P.6
  • 18
    • 50249175122 scopus 로고    scopus 로고
    • Jamming-resistant key establishment using uncoordinated frequency hopping
    • Oakland, CA
    • M. Strasser, C. Popper, S. Capkun, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symp. Security Privacy, Oakland, CA, 2008, pp. 64-78.
    • (2008) Proc. IEEE Symp. Security Privacy , pp. 64-78
    • Strasser, M.1    Popper, C.2    Capkun, S.3    Cagalj, M.4
  • 19
    • 77953998228 scopus 로고    scopus 로고
    • Zero pre-shared secret key establishment in the presence of jammers
    • May
    • T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proc. ACM MobiHoc,May 2009, pp. 219-228.
    • (2009) Proc. ACM MobiHoc , pp. 219-228
    • Jin, T.1    Noubir, G.2    Thapa, B.3
  • 20
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1367, 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1367
    • Wyner, A.D.1
  • 21
    • 45249092485 scopus 로고    scopus 로고
    • Secure broadcasting over fading channels
    • Jun.
    • A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2453-2469
    • Khisti, A.1    Tchamkerten, A.2    Wornell, G.W.3
  • 22
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec.
    • A. O. Hero, III, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero Iii., A.O.1
  • 23
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, pp. 97-139, 2008.
    • (2008) SIAM J. Comput. , vol.38 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 26
    • 0015648934 scopus 로고
    • Noiseless coding of correlated information sources
    • Jul.
    • D. Slepian and J. K.Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inf. Theory, vol. IT-19, no. 4, pp. 471-480, Jul. 1973.
    • (1973) IEEE Trans. Inf. Theory , vol.IT-19 , Issue.4 , pp. 471-480
    • Slepian, D.1    Wolf, J.K.2
  • 27
    • 0037356065 scopus 로고    scopus 로고
    • Distributed source coding using syndromes (DISCUS): Design and construction
    • Mar.
    • S. S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 626-643, Mar. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.3 , pp. 626-643
    • Pradhan, S.S.1    Ramchandran, K.2
  • 28
    • 78049508239 scopus 로고    scopus 로고
    • Secret key agreement from correlated Gaussian sources by rate limited public communication
    • S. Watanabe and Y. Oohama, "Secret key agreement from correlated Gaussian sources by rate limited public communication," IEICE Trans. Fund. Electron., Commun. Comput. Sci., vol. E93-A, no. 11, pp. 1976-1983, 2010.
    • (2010) IEICE Trans. Fund. Electron., Commun. Comput. Sci. , vol.E93-A , Issue.11 , pp. 1976-1983
    • Watanabe, S.1    Oohama, Y.2
  • 29
    • 80051770683 scopus 로고    scopus 로고
    • Secret key agreement from vector Gaussian sources by rate limited public communication
    • Sep.
    • S. Watanabe and Y. Oohama, "Secret key agreement from vector Gaussian sources by rate limited public communication," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 541-550, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 541-550
    • Watanabe, S.1    Oohama, Y.2
  • 31


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.