메뉴 건너뛰기




Volumn 12, Issue 12, 2013, Pages 2496-2506

Threshold constraints on symmetric key extraction from rician fading estimates

Author keywords

Rician fading; symmetric encryption key; Wireless physical layer security

Indexed keywords

PASSIVE EAVESDROPPERS; PROPAGATION ENVIRONMENT; RANDOM NUMBER GENERATORS; RICIAN FADING; SYMMETRIC ENCRYPTION; THRESHOLD CONSTRAINTS; TRANSMISSION FREQUENCIES; WIRELESS PHYSICAL LAYER SECURITIES;

EID: 84887842803     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2012.226     Document Type: Article
Times cited : (17)

References (33)
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, " Comm. ACM, vol. 21, pp. 120-126, 1978
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 4
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. Hellman, "New Directions in Cryptography, " IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 5
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Feb.
    • N.R. Potlapally, S. Ravi, A. Raghunath, and N.K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols, " IEEE Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143, Feb. 2006.
    • (2006) IEEE Trans. Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunath, A.3    Jha, N.K.4
  • 8
    • 79960399745 scopus 로고    scopus 로고
    • Robust beamforming for security in mimo wiretap channels with imperfect csi
    • Jan.
    • A. Mukherjee and A.L. Swindlehurst, "Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI, " IEEE Trans. Signal Processing, vol. 59, no. 1, pp. 351-361, Jan. 2011.
    • (2011) IEEE Trans. Signal Processing , vol.59 , Issue.1 , pp. 351-361
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 9
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P.K. Gopala, L. Lai, and H. El Gamal, "On the Secrecy Capacity of Fading Channels, " IEEE Trans. Information Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Information Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    El Gamal, H.3
  • 10
    • 79956205910 scopus 로고    scopus 로고
    • Maximal ratio diversity combining enhanced security
    • Mar.
    • F. He, H. Man, and W. Wang, "Maximal Ratio Diversity Combining Enhanced Security, " IEEE Comm. Letters, vol. 15, no. 5, pp. 509-511, Mar. 2011.
    • (2011) IEEE Comm. Letters , vol.15 , Issue.5 , pp. 509-511
    • He, F.1    Man, H.2    Wang, W.3
  • 11
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A.P. Petropulu, and H.V. Poor, "Improving Wireless Physical Layer Security via Cooperating Relays, " IEEE Trans. Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Processing , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 12
    • 70349925048 scopus 로고    scopus 로고
    • Secured communication over frequency-selective fading channels: A practical vandermonde precoding
    • M. Kobayashi, M. Debbah, and S. Shamai, "Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding, " Eurasip J. Wireless Comm. and Networking, 2009.
    • (2009) Eurasip J. Wireless Comm. and Networking
    • Kobayashi, M.1    Debbah, M.2    Shamai, S.3
  • 13
    • 71149098880 scopus 로고    scopus 로고
    • Securing ofdm over wireless time-varying channels using sub-carrier over-loading with joint signal constellations
    • G.R. Tsouri and D. Wulich, "Securing OFDM over Wireless Time-Varying Channels Using Sub-Carrier Over-Loading with Joint Signal Constellations, " Eurasip J. Wireless Comm. and Networking, 2009.
    • (2009) Eurasip J. Wireless Comm. and Networking
    • Tsouri, G.R.1    Wulich, D.2
  • 14
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • Jan.
    • J.E. Hershey, A.A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management, " IEEE Trans. Comm., vol. 43, no. 1, pp. 3-6, Jan. 1995.
    • (1995) IEEE Trans. Comm. , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 15
    • 0033881606 scopus 로고    scopus 로고
    • Secure information transmission for mobile radio
    • Feb.
    • H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure Information Transmission for Mobile Radio, " IEEE Comm. Letters, vol. 4, no. 2, pp. 52-55, Feb. 2000.
    • (2000) IEEE Comm. Letters , vol.4 , Issue.2 , pp. 52-55
    • Koorapaty, H.1    Hassan, A.2    Chennakeshu, S.3
  • 16
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • June
    • Y. Liang, H.V. Poor, and S. Shamai (Shitz), "Secure Communication over Fading Channels, " IEEE Trans. Information Theory, vol. 54, no. 6, pp. 2470-2492, June 2008.
    • (2008) IEEE Trans. Information Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 17
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sept.
    • R. Wilson, D. Tse, and R.A. Scholtz, "Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels, " IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 364-375, Sept. 2007.
    • (2007) IEEE Trans. Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 18
    • 84860686731 scopus 로고    scopus 로고
    • Secret key establishment using temporally and spatially correlated wireless channel coefficients
    • Feb.
    • C. Chen and M.A. Jensen, "Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients, " IEEE Trans. Mobile Computing, vol. 10, no. 2, pp. 205-215, Feb. 2011.
    • (2011) IEEE Trans. Mobile Computing , vol.10 , Issue.2 , pp. 205-215
    • Chen, C.1    Jensen, M.A.2
  • 21
    • 77955667690 scopus 로고    scopus 로고
    • Automatic secret keys from reciprocal mimo wireless channels: Measurements and analysis
    • Sept.
    • J.W. Wallace and R.K. Sharma, "Automatic Secret Keys from Reciprocal MIMO Wireless Channels: Measurements and Analysis, " IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 381-392, Sept. 2010.
    • (2010) IEEE Trans. Information Forensics and Security , vol.5 , Issue.3 , pp. 381-392
    • Wallace, J.W.1    Sharma, R.K.2
  • 24
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • Jan.
    • N. Patwari, J. Croft, S. Jana, and S. Kumar Kasera, "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements, " IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17-30, Jan. 2010.
    • (2010) IEEE Trans. Mobile Computing , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kumar Kasera, S.4
  • 25
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • July
    • L. Xiao, L. Greenstein, N.B. Mandayam, and W. Trappe, "Using the Physical Layer for Wireless Authentication in Time-Variant Channels, " IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2571-2579, July 2008.
    • (2008) IEEE Trans. Wireless Comm. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.B.3    Trappe, W.4
  • 26
    • 73049092718 scopus 로고    scopus 로고
    • Channel-based spoofing detection in frequency-selective ray-leigh channels
    • Dec.
    • L. Xiao, L. Greenstein, N.B. Mandayam, and W. Trappe, "Channel-Based Spoofing Detection in Frequency-Selective Ray-leigh Channels, " IEEE Trans. Wireless Comm., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
    • (2009) IEEE Trans. Wireless Comm. , vol.8 , Issue.12 , pp. 5948-5956
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.B.3    Trappe, W.4
  • 29
    • 33845642280 scopus 로고    scopus 로고
    • Novel sum-of-sinusoids simulation models for rayleigh and rician fading channels
    • Dec.
    • C. Xiao, Y.R. Zheng, and N.C. Beaulieu, "Novel Sum-of-Sinusoids Simulation Models for Rayleigh and Rician Fading Channels, " IEEE Trans. Wireless Comm., vol. 5, no. 12, pp. 3667-3679, Dec. 2006.
    • (2006) IEEE Trans. Wireless Comm. , vol.5 , Issue.12 , pp. 3667-3679
    • Xiao, C.1    Zheng, Y.R.2    Beaulieu, N.C.3
  • 31
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon, "Communication Theory of Secrecy Systems, " Bell Systems Technical J., vol. 28, pp. 656-715, 1949.
    • (1949) Bell Systems Technical J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 32
    • 84923996598 scopus 로고    scopus 로고
    • A. Goldsmith, Wireless Communications. Univ., 2005
    • A. Goldsmith, Wireless Communications. Univ., 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.