메뉴 건너뛰기




Volumn 12, Issue 9, 2013, Pages 1842-1852

Adaptive wireless channel probing for shared key generation based on PID controller

Author keywords

information theory; PID controller; shared key generation; Wireless channel probing

Indexed keywords

CHANNEL STATISTICS; KEY GENERATION; KEY GENERATION RATE; LEMPEL ZIV COMPLEXITY; PID CONTROLLERS; PROPORTIONAL INTEGRAL DERIVATIVE CONTROLLERS; RECEIVED SIGNAL STRENGTH; WIRELESS CHANNEL;

EID: 84881015585     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2012.144     Document Type: Article
Times cited : (74)

References (30)
  • 1
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 2
    • 79960864004 scopus 로고    scopus 로고
    • Adaptive wireless channel probing for shared key generation
    • Apr
    • Y. Wei, K. Zeng, and P. Mohapatra, "Adaptive Wireless Channel Probing for Shared Key Generation," Proc. IEEE INFOCOM, Apr. 2011.
    • (2011) Proc IEEE INFOCOM
    • Wei, Y.1    Zeng, K.2    Mohapatra, P.3
  • 3
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, and S.V. Krishnamurthy, "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. ACM MobiCom, pp. 321-332, 2009.
    • (2009) Proc ACM MobiCom , pp. 321-332
    • Jana, S.1    Premnath, S.N.2    Clark, M.3    Kasera, S.K.4    Patwari, N.5    Krishnamurthy, S.V.6
  • 4
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel," Proc. ACM MobiCom, pp. 128-139, 2008.
    • (2008) Proc ACM MobiCom , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 5
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • Mar
    • K. Zeng, D. Wu, C.A., and P. Mohapatra, "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," Proc. IEEE INFOCOM, pp. 1-9, Mar. 2010.
    • (2010) Proc IEEE INFOCOM , pp. 1-9
    • Zeng, K.1    Wu, C.A.D.2    Mohapatra, P.3
  • 6
    • 72249083097 scopus 로고    scopus 로고
    • High-Rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • Jan.
    • N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17-30, Jan. 2010.
    • (2010) IEEE Trans. Mobile Computing , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.4
  • 8
    • 84860686731 scopus 로고    scopus 로고
    • Secret key establishment using temporally and spatially correlated wireless channel coefficients
    • Feb.
    • C. Chen and M. Jensen, "Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients," IEEE Trans. Mobile Computing, vol. 10, no. 2, pp. 205-215, Feb. 2011.
    • (2011) IEEE Trans. Mobile Computing , vol.10 , Issue.2 , pp. 205-215
    • Chen, C.1    Jensen, M.2
  • 10
    • 0016880887 scopus 로고
    • On the complexity of finite sequences
    • Jan
    • A. Lempel and J. Ziv, "On the Complexity of Finite Sequences," IEEE Trans. Information Theory, vol. 22, no. 1, pp. 75-81, Jan. 1976.
    • (1976) IEEE Trans. Information Theory , vol.22 , Issue.1 , pp. 75-81
    • Lempel, A.1    Ziv, J.2
  • 12
    • 33947126657 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting the reactance-domain scalar response of multipath fading channels: RSSI Interleaving Scheme
    • Oct
    • T. Aono, K. Higuchi, M. Taromaru, T. Ohira, and H. Sasaoka, "Wireless Secret Key Generation Exploiting the Reactance-Domain Scalar Response of Multipath Fading Channels: RSSI Interleaving Scheme," Proc. European Conf. Wireless Technology, pp. 173-176, Oct. 2005.
    • (2005) Proc. European Conf. Wireless Technology , pp. 173-176
    • Aono, T.1    Higuchi, K.2    Taromaru, M.3    Ohira, T.4    Sasaoka, H.5
  • 14
    • 50249098715 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sept
    • R. Wilson, D. Tse, and R. Scholtz, "Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels," Proc. IEEE Int'l Conf. Ultra-Wideband, pp. 270-275, Sept. 2007.
    • (2007) Proc IEEE Int'l Conf. Ultra-Wideband , pp. 270-275
    • Wilson, R.1    Tse, D.2    Scholtz, R.3
  • 15
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U.M. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Information Theory, vol. 39, no. 3, pp. 733-742, May 1993.
    • (1993) IEEE Trans. Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 17
    • 0001777508 scopus 로고    scopus 로고
    • Linking information reconciliation and privacy amplification
    • C. Cachin and U.M. Maurer, "Linking Information Reconciliation and Privacy Amplification," J. Cryptology, vol. 10, pp. 97-110, 1997. (Pubitemid 127754567)
    • (1997) Journal of Cryptology , vol.10 , Issue.2 , pp. 97-110
    • Cachin, C.1
  • 18
    • 0033881606 scopus 로고    scopus 로고
    • Secure information transmission for mobile radio
    • DOI 10.1109/4234.824754
    • H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure Information Transmission for Mobile Radio," IEEE Comm. Letters, vol. 4, no. 2, pp. 52-55, Feb. 2000. (Pubitemid 30564390)
    • (2000) IEEE Communications Letters , vol.4 , Issue.2 , pp. 52-55
    • Koorapaty, H.1    Hassan, A.A.2    Chennakeshu, S.3
  • 23
    • 77955667690 scopus 로고    scopus 로고
    • Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis
    • Sept.
    • J. Wallace and R. Sharma, "Automatic Secret Keys from Reciprocal MIMO Wireless Channels: Measurement and Analysis," IEEE Trans. Wireless Comm., vol. 5, no. 3, pp. 381-392, Sept. 2010.
    • (2010) IEEE Trans. Wireless Comm , vol.5 , Issue.3 , pp. 381-392
    • Wallace, J.1    Sharma, R.2
  • 24
    • 84904651793 scopus 로고    scopus 로고
    • "Wireshark," http://en.wikipedia. org/wiki/Wireshark, 2013.
    • (2013) Wireshark
  • 25
    • 0003418321 scopus 로고
    • DARPA internet program protocol specification
    • Sept
    • J. Postel, "DARPA Internet Program Protocol Specification," IETF RFC 792, Sept. 1981.
    • (1981) IETF RFC , vol.792
    • Postel, J.1
  • 27
    • 12144290812 scopus 로고    scopus 로고
    • Estimating the Entropy Rate of Spike Trains via Lempel-Ziv Complexity
    • DOI 10.1162/089976604322860677
    • J.M. Amigo, J. Szczepanski, E. Wajnryb, and M.V. Sanchez-Vives, "Estimating the Entropy Rate of Spike Trains via Lempel-Ziv Complexity," Neural Computation, vol. 16, pp. 717-736, 2004. (Pubitemid 38318130)
    • (2004) Neural Computation , vol.16 , Issue.4 , pp. 717-736
    • Amigo, J.M.1    Szczepanski, J.2    Wajnryb, E.3    Sanchez-Vives, M.V.4
  • 29
    • 0000756319 scopus 로고
    • Optimum settings for automatic controllers
    • J.B. Ziegler and N.B. Nichols, "Optimum Settings for Automatic Controllers," ASME Trans., vol. 64, pp. 759-768, 1942.
    • (1942) ASME Trans , vol.64 , pp. 759-768
    • Ziegler, J.B.1    Nichols, N.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.