메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

A multihop key agreement scheme for wireless Ad hoc networks based on channel characteristics

Author keywords

[No Author keywords available]

Indexed keywords

ARITHMETIC; ARTICLE; COMPUTER LANGUAGE; COMPUTER NETWORK; COMPUTER SECURITY; INFORMATION PROCESSING; PERFORMANCE; PRIVACY; PRODUCTIVITY; SIGNAL NOISE RATIO; SIMULATION; THREAT; WIRELESS COMMUNICATION; ALGORITHM; INFORMATION RETRIEVAL; METHODOLOGY; SIGNAL PROCESSING;

EID: 84878663786     PISSN: None     EISSN: 1537744X     Source Type: Journal    
DOI: 10.1155/2013/935604     Document Type: Article
Times cited : (8)

References (50)
  • 1
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • 2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
    • Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 2011 34 1 1 11 2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 6
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • 2-s2.0-72249083097 10.1109/TMC.2009.88
    • Patwari N., Croft J., Jana S., Kasera S. K., High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing 2010 9 1 17 30 2-s2.0-72249083097 10.1109/TMC.2009.88
    • (2010) IEEE Transactions on Mobile Computing , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.K.4
  • 8
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • 2-s2.0-0029234878 10.1109/26.385951
    • Hershey J. E., Hassan A. A., Yarlagadda R., Unconventional cryptographic keying variable management. IEEE Transactions on Communications 1995 43 1 3 6 2-s2.0-0029234878 10.1109/26.385951
    • (1995) IEEE Transactions on Communications , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 11
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • DOI 10.1109/TAP.2005.858853
    • Aono T., Higuchi K., Ohira T., Komiyama B., Sasaoka H., Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Transactions on Antennas and Propagation 2005 53 11 3776 3784 2-s2.0-28644438588 10.1109/TAP.2005.858853 (Pubitemid 41748822)
    • (2005) IEEE Transactions on Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 12
    • 34247339387 scopus 로고    scopus 로고
    • Securing wireless systems via lower layer enforcements
    • DOI 10.1145/1161289.1161297, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
    • Zang L., Wenyuan X., Miller R., Trappe W., Securing wireless systems via lower layer enforcements. Proceedings of the 5th ACM Workshop on Wireless Security (WiSE '06) September 2006 ACM 33 42 2-s2.0-34247339387 10.1145/1161289.1161297 (Pubitemid 46634300)
    • (2006) WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security , vol.2006 , pp. 33-42
    • Zang, L.1    Wenyuan, X.2    Miller, R.3    Trappe, W.4
  • 13
    • 39049156464 scopus 로고    scopus 로고
    • Extracting secrecy from jointly Gaussian random variables
    • DOI 10.1109/ISIT.2006.262101, 4036441, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • Ye C., Reznik A., Shah Y., Extracting secrecy from jointly Gaussian random variables. Proceedings of the IEEE International Symposium on Information Theory (ISIT '06) July 2006 2593 2597 2-s2.0-39049156464 10.1109/ISIT.2006. 262101 (Pubitemid 351244572)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 2593-2597
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 25
    • 70449479022 scopus 로고    scopus 로고
    • Secure physical layer key generation schemes: Performance and information theoretic limits
    • June 2009 2-s2.0-70449479022 10.1109/ICC.2009.5199440
    • Wallace J., Secure physical layer key generation schemes: performance and information theoretic limits. Proceedings of the IEEE International Conference on Communications (ICC '09) June 2009 1 5 2-s2.0-70449479022 10.1109/ICC.2009.5199440
    • Proceedings of the IEEE International Conference on Communications (ICC '09) , pp. 1-5
    • Wallace, J.1
  • 28
    • 50249098715 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • September 2007 2-s2.0-50249098715 10.1109/ICUWB.2007.4380954
    • Wilson R., Tse D., Scholtz R. A., Channel identification: secret sharing using reciprocity in ultrawideband channels. Proceedings of the IEEE International Conference on Ultra-Wideband (ICUWB '07) September 2007 270 275 2-s2.0-50249098715 10.1109/ICUWB.2007.4380954
    • Proceedings of the IEEE International Conference on Ultra-Wideband (ICUWB '07) , pp. 270-275
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 35
    • 80052337836 scopus 로고    scopus 로고
    • Secret key generation exploiting channel characteristics in wireless communications
    • Ren K., Su H., Wang Q., Secret key generation exploiting channel characteristics in wireless communications. IEEE Wireless Communications 2011 18 4 6 12
    • (2011) IEEE Wireless Communications , vol.18 , Issue.4 , pp. 6-12
    • Ren, K.1    Su, H.2    Wang, Q.3
  • 36
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • 2-s2.0-0023985539
    • Bennett C. H., Brassard G., Robert J. M., Privacy amplification by public discussion. SIAM Journal on Computing 1988 17 2 210 229 2-s2.0-0023985539
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.M.3
  • 38
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • Cachin C., Linking information reconciliation and privacy amplification. Journal of Cryptology 1997 10 2 97 110 2-s2.0-0001777508 (Pubitemid 127754567)
    • (1997) Journal of Cryptology , vol.10 , Issue.2 , pp. 97-110
    • Cachin, C.1
  • 39
  • 43
    • 4143138747 scopus 로고    scopus 로고
    • Node-disjoint path routing in wireless networks: Tradeoff between path lifetime and total energy
    • June 2004 2-s2.0-4143138747
    • Tang J., Xue G., Node-disjoint path routing in wireless networks: Tradeoff between path lifetime and total energy. Proceedings of the IEEE International Conference on Communications (ICC '04) June 2004 3812 3816 2-s2.0-4143138747
    • Proceedings of the IEEE International Conference on Communications (ICC '04) , pp. 3812-3816
    • Tang, J.1    Xue, G.2
  • 47
    • 0016102201 scopus 로고
    • Single tone parameter estimation from discrete-time observations
    • 2-s2.0-0016102201
    • Rife D. C., Boorstyn R. R., Single tone parameter estimation from discrete-time observations. IEEE Transactions on Information Theory 1974 IT-20 5 591 598 2-s2.0-0016102201
    • (1974) IEEE Transactions on Information Theory , vol.20 , Issue.5 , pp. 591-598
    • Rife, D.C.1    Boorstyn, R.R.2
  • 48
    • 0032186636 scopus 로고    scopus 로고
    • Parsec: A parallel simulation environment for complex systems
    • Bagrodia R., Meyer R., Takai M., Chen Y. A., Zeng X., Martin J., Song H. Y., Parsec: a parallel simulation environment for complex systems. Computer 1998 31 10 77 85 2-s2.0-0032186636 (Pubitemid 128550810)
    • (1998) Computer , vol.31 , Issue.10 , pp. 77-85
    • Bagrodia, R.1    Meyer, R.2    Takai, M.3    Chen, Y.-A.4    Zeng, X.5    Martin, J.6    Song, H.Y.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.