메뉴 건너뛰기




Volumn 12, Issue 5, 2013, Pages 917-930

Secret key extraction from wireless signal strength in real environments

Author keywords

cryptography; key generation; multipath fading; physical layer; Wireless networks

Indexed keywords

802.11 WIRELESS NETWORKS; KEY GENERATION; MULTIPLE INPUT MULTIPLE OUTPUT; PHYSICAL LAYERS; PRIVACY AMPLIFICATION; RECEIVED SIGNAL STRENGTH; SECRET KEY GENERATIONS; SENSOR NETWORK TEST-BED;

EID: 84875681349     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2012.63     Document Type: Article
Times cited : (286)

References (31)
  • 2
    • 84875683741 scopus 로고    scopus 로고
    • "ipwraw," http://homepages.tu-darmstadt.de/~p-larbig/wlan, 2012.
    • (2012) Ipwraw
  • 3
    • 84875660732 scopus 로고    scopus 로고
    • "Radiotap," http://www.radiotap.org, 2012.
    • (2012)
  • 5
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • DOI 10.1109/TAP.2005.858853
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless Secret Key Generation Exploiting Reactance-Domain Scalar Response of Multipath Fading Channels," IEEE Trans. Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, Nov. 2005. (Pubitemid 41748822)
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 14
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • Jan
    • J.E. Hershey, A.A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management," IEEE Trans. Comm., vol. 43, no. 1, pp. 3-6, Jan. 1995.
    • (1995) IEEE Trans. Comm , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 16
    • 60349083720 scopus 로고    scopus 로고
    • On fast and accurate detection of unauthorized access points using clock skews
    • S. Jana and S.K. Kasera, "On Fast and Accurate Detection of Unauthorized Access Points Using Clock Skews," Proc. ACM MobiCom, 2008.
    • (2008) Proc ACM MobiCom
    • Jana, S.1    Kasera, S.K.2
  • 20
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N.B. Mandayam, C. Ye, and A. Reznik, "Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel," Proc. ACM MobiCom, 2008.
    • (2008) Proc. ACM MobiCom
    • Mathur, S.1    Trappe, W.2    Mandayam, N.B.3    Ye, C.4    Reznik, A.5
  • 21
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U.M. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 22
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar
    • U.M. Maurer and S. Wolf, "Unconditionally Secure Key Agreement and the Intrinsic Conditional Information," IEEE Trans. Information Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Information Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 26
    • 0001998264 scopus 로고
    • Conjugate coding
    • S. Wiesner, "Conjugate Coding," SIGACT News, vol. 15, no. 1, pp. 78-88, 1983.
    • (1983) SIGACT News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1
  • 27
    • 77949875012 scopus 로고    scopus 로고
    • Radio tomographic imaging with wireless networks
    • May
    • J. Wilson and N. Patwari, "Radio Tomographic Imaging with Wireless Networks," IEEE Trans. Mobile Computing, vol. 9, no. 5, pp. 621-632, May 2010.
    • (2010) IEEE Trans. Mobile Computing , vol.9 , Issue.5 , pp. 621-632
    • Wilson, J.1    Patwari, N.2
  • 28
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • DOI 10.1109/TIFS.2007.902666
    • R. Wilson, D. Tse, and R.A. Scholtz, "Channel Identification: Secret Sharing Using Reciprocity in UWB Channels," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 364-375, Sept. 2007. (Pubitemid 47290572)
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.