메뉴 건너뛰기




Volumn , Issue , 2013, Pages 3048-3056

Fast and practical secret key extraction by exploiting channel response

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL INFORMATION; CHANNEL RESPONSE; MOBILE ENVIRONMENTS; MOBILE WIRELESS NETWORK; OUTDOOR ENVIRONMENT; REAL-WORLD SCENARIO; RECEIVED SIGNAL STRENGTH; WIRELESS COMMUNICATIONS;

EID: 84883122633     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6567117     Document Type: Conference Paper
Times cited : (246)

References (20)
  • 1
    • 84860665083 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in IEEE ICASSP, 2008.
    • (2008) IEEE ICASSP
    • Sayeed, A.1    Perrig, A.2
  • 2
    • 79957865221 scopus 로고    scopus 로고
    • Unconditionally secure communications over fading channels
    • M. Tope and J. McEachen, "Unconditionally secure communications over fading channels," in IEEE MILCOM, 2001.
    • (2001) IEEE MILCOM
    • Tope, M.1    McEachen, J.2
  • 3
    • 60149088258 scopus 로고    scopus 로고
    • Robust key generation from signal envelopes in wireless networks
    • B. Azimi-Sadjadi and et al., "Robust key generation from signal envelopes in wireless networks," in ACM CCS, 2007.
    • (2007) ACM CCS
    • Azimi-Sadjadi, B.1
  • 4
    • 60149097098 scopus 로고    scopus 로고
    • Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in ACM MobiCom, 2008.
    • (2008) ACM MobiCom
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 5
    • 70649113058 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Transactions on Mobile Computing, 2009.
    • (2009) IEEE Transactions on Mobile Computing
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.4
  • 6
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • K. Zeng and et al., "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks," in IEEE INFOCOM, 2010.
    • (2010) IEEE INFOCOM
    • Zeng, K.1
  • 7
    • 77952329424 scopus 로고    scopus 로고
    • Secret keys from entangled sensor motes: Implementation and analysis
    • M. Wilhelm, I. Martinovic, and J. Schmitt, "Secret keys from entangled sensor motes: implementation and analysis," in ACM Wisec, 2010.
    • (2010) ACM Wisec
    • Wilhelm, M.1    Martinovic, I.2    Schmitt, J.3
  • 8
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana and et al., "On the effectiveness of secret key extraction from wireless signal strength in real environments," in ACM MobiCom, 2009.
    • (2009) ACM MobiCom
    • Jana, S.1
  • 10
    • 84881150085 scopus 로고    scopus 로고
    • Tool release: Gathering 802.11n traces with channel state information
    • D. Halperin and et al., "Tool release: Gathering 802.11n traces with channel state information," ACM SIGCOMM CCR, 2011.
    • (2011) ACM SIGCOMM CCR
    • Halperin, D.1
  • 11
    • 79960885380 scopus 로고    scopus 로고
    • Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
    • Q. Wang, H. Su, K. Ren, and K. Kim, "Fast and scalable secret key generation exploiting channel phase randomness in wireless networks," in IEEE INFOCOM, 2011.
    • (2011) IEEE INFOCOM
    • Wang, Q.1    Su, H.2    Ren, K.3    Kim, K.4
  • 13
    • 84883128611 scopus 로고    scopus 로고
    • Vulnerabilities of wireless key exchange based on channel reciprocity
    • N. Döttling and et al., "Vulnerabilities of wireless key exchange based on channel reciprocity," Information Security Applications, 2011.
    • (2011) Information Security Applications
    • Döttling, N.1
  • 14
    • 84867755583 scopus 로고    scopus 로고
    • Limitations of generating a secret key using wireless fading under active adversary
    • M. Zafer, D. Agrawal, and M. Srivatsa, "Limitations of generating a secret key using wireless fading under active adversary," IEEE/ACM Transactions on Networking, 2012.
    • (2012) IEEE/ACM Transactions on Networking
    • Zafer, M.1    Agrawal, D.2    Srivatsa, M.3
  • 15
    • 79957837002 scopus 로고    scopus 로고
    • On passive inference attacks against physical-layer key extraction?
    • M. Edman, A. Kiayias, and B. Yener, "On passive inference attacks against physical-layer key extraction?" in EUROSEC, 2011.
    • (2011) EUROSEC
    • Edman, M.1    Kiayias, A.2    Yener, B.3
  • 16
    • 84883069922 scopus 로고    scopus 로고
    • Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness
    • T.-H. Chou, S. Draper, and A. Sayeed, "Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness," in IEEE ISIT, 2010.
    • (2010) IEEE ISIT
    • Chou, T.-H.1    Draper, S.2    Sayeed, A.3
  • 17
    • 84861623350 scopus 로고    scopus 로고
    • Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
    • H. Liu, J. Yang, Y. Wang, and Y. Chen, "Collaborative secret key extraction leveraging received signal strength in mobile wireless networks," in IEEE INFOCOM, 2012.
    • (2012) IEEE INFOCOM
    • Liu, H.1    Yang, J.2    Wang, Y.3    Chen, Y.4
  • 18
    • 84883100784 scopus 로고    scopus 로고
    • Extracting secrecy from jointly gaussian random variables
    • C. Ye, A. Reznik, and Y. Shah, "Extracting secrecy from jointly gaussian random variables," in IEEE ISIT, 2006.
    • (2006) IEEE ISIT
    • Ye, C.1    Reznik, A.2    Shah, Y.3
  • 19
    • 84883128684 scopus 로고
    • Final report on RF channel characterization
    • Joint Technical Committee (JTC) on Wireless Access
    • Joint Technical Committee (JTC) on Wireless Access, "Final Report on RF Channel Characterization," JTC(AIR)/93.09.23-238R2, 1993.
    • (1993) JTC(AIR)/93.09.23-238R2
  • 20
    • 3843081053 scopus 로고    scopus 로고
    • A statistical test suite for random and pseudorandom number generators for cryptographic applications
    • A. Rukhin and et al., "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, 2001.
    • (2001) National Institute of Standards and Technology
    • Rukhin, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.