메뉴 건너뛰기




Volumn 4, Issue 1, 2013, Pages 1-16

A cyber-physical approach to secret key generation in smart environments

Author keywords

[No Author keywords available]

Indexed keywords

CYBER PHYSICAL SYSTEM; NETWORK SECURITY; RANDOM PROCESSES;

EID: 84872830982     PISSN: 18685137     EISSN: 18685145     Source Type: Journal    
DOI: 10.1007/s12652-011-0051-5     Document Type: Article
Times cited : (10)

References (32)
  • 1
    • 73149118063 scopus 로고    scopus 로고
    • Correlated link shadow fading in multi-hop wireless networks
    • Agrawal P, Patwari N (2009) Correlated link shadow fading in multi-hop wireless networks. Wireless Commun IEEE Trans 8(8): 4024-4036.
    • (2009) Wireless Commun IEEE Trans , vol.8 , Issue.8 , pp. 4024-4036
    • Agrawal, P.1    Patwari, N.2
  • 4
    • 34047126869 scopus 로고    scopus 로고
    • Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee Standards
    • Baronti P, Pillai P, Chook VWC, Chessa S, Gotta A, Hu Y-F (2007) Wireless sensor networks: a survey on the state of the art and the 802. 15. 4 and ZigBee Standards. Comput Commun 30(7): 1655-1695.
    • (2007) Comput Commun , vol.30 , Issue.7 , pp. 1655-1695
    • Baronti, P.1    Pillai, P.2    Chook, V.W.C.3    Chessa, S.4    Gotta, A.5    Hu, Y.-F.6
  • 8
    • 84872835829 scopus 로고    scopus 로고
    • Crossbow
    • Crossbow http://www. xbow. com.
  • 9
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • Csiszar I, Korner J (1978) Broadcast channels with confidential messages. IEEE Trans Inform Theory 24(3): 339-348.
    • (1978) IEEE Trans Inform Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 14
    • 21644489172 scopus 로고    scopus 로고
    • enlisting hardware architecture to thwart malicious code injection
    • Series lecture notes in computer science, Springer, Berlin
    • Lee RB, Karig DK, McGregor JP, Shi Z (2004) enlisting hardware architecture to thwart malicious code injection. In: Security in pervasive computing. Series lecture notes in computer science, vol 2802, Springer, Berlin, pp 170-179.
    • (2004) Security in pervasive computing , vol.2802 , pp. 170-179
    • Lee, R.B.1    Karig, D.K.2    McGregor, J.P.3    Shi, Z.4
  • 17
    • 78149248764 scopus 로고
    • Protocols for secret key agreement by public discussion based on common information
    • Series lecture notes in computer science. Springer, Berlin
    • Maurer U (1993) Protocols for secret key agreement by public discussion based on common information. In: Advances in cryptology-CRYPTO '92. Series lecture notes in computer science, vol 740, Springer, Berlin, pp 461-470.
    • (1993) Advances in cryptology-CRYPTO '92 , vol.740 , pp. 461-470
    • Maurer, U.1
  • 18
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Parts I-III
    • Maurer U, Wolf S (2003) Secret-key agreement over unauthenticated public channels-parts I-III. IEEE Trans Inform Theory 49(4): 822-851.
    • (2003) IEEE Trans Inform Theory , vol.49 , Issue.4 , pp. 822-851
    • Maurer, U.1    Wolf, S.2
  • 19
    • 77952412339 scopus 로고    scopus 로고
    • Unbreakable keys from random noise
    • In: Tuyls P, Skoric B, Kevenaar T (eds), Springer, Berlin
    • Maurer U, Renner R, Wolf S (2007) Unbreakable keys from random noise. In: Tuyls P, Skoric B, Kevenaar T (eds) Security with noisy data. Springer, Berlin, pp 21-44.
    • (2007) Security with noisy data , pp. 21-44
    • Maurer, U.1    Renner, R.2    Wolf, S.3
  • 22
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • Patwari N, Croft J, Jana S, Kasera SK (2010) High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans Mobile Comput 9(1): 17-30.
    • (2010) IEEE Trans Mobile Comput , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.K.4
  • 27
    • 51249123020 scopus 로고    scopus 로고
    • A Practical evaluation of radio signal strength for ranging-based localization
    • Whitehouse K, Karlof C, Culler D (2007) A Practical evaluation of radio signal strength for ranging-based localization. SIGMOBILE Mob Comput Commun Rev 11(1): 41-52.
    • (2007) SIGMOBILE Mob Comput Commun Rev , vol.11 , Issue.1 , pp. 41-52
    • Whitehouse, K.1    Karlof, C.2    Culler, D.3
  • 30
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner A (1975) The wire-tap channel. Bell Syst Tech J 54(8): 1355-1387.
    • (1975) Bell Syst Tech J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.