메뉴 건너뛰기




Volumn , Issue , 2014, Pages 997-1005

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

COALITIONAL GAME; CORE SOLUTIONS; DEVICETO-DEVICE (D2D) COMMUNICATION; DISTRIBUTED PROTOCOLS; EXTENSIVE SIMULATIONS; KEY GENERATION; MOBILE NODES; WIRELESS CHANNEL;

EID: 84904412386     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2014.6848029     Document Type: Conference Paper
Times cited : (27)

References (18)
  • 1
    • 84863772559 scopus 로고    scopus 로고
    • Operator controlled deviceto-device communications in LTE-advanced networks
    • June
    • L. Lei, Z. Zhong, C. Lin, and X. Shen, "Operator controlled deviceto-device communications in LTE-advanced networks," IEEE Wireless Communications, vol. 19, no. 3, pp. 96-104, June 2012.
    • (2012) IEEE Wireless Communications , vol.19 , Issue.3 , pp. 96-104
    • Lei, L.1    Zhong, Z.2    Lin, C.3    Shen, X.4
  • 2
    • 60149088258 scopus 로고    scopus 로고
    • Robust key generation from signal envelopes in wireless networks
    • Alexandria, Virginia, USA
    • B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, "Robust key generation from signal envelopes in wireless networks," in CCS'07, Alexandria, Virginia, USA, 2007.
    • (2007) CCS'07
    • Azimi-Sadjadi, B.1    Kiayias, A.2    Mercado, A.3    Yener, B.4
  • 3
    • 60149097098 scopus 로고    scopus 로고
    • Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
    • San Francisco, California, USA
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel," in MobiCom'08, San Francisco, California, USA, 2008, pp. 128-139.
    • (2008) MobiCom'08 , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 4
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • Beijing, China
    • S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, "On the effectiveness of secret key extraction from wireless signal strength in real environments," in MobiCom'09, Beijing, China, 2009.
    • (2009) MobiCom'09
    • Jana, S.1    Premnath, S.2    Clark, M.3    Kasera, S.4    Patwari, N.5    Krishnamurthy, S.6
  • 7
    • 79960857245 scopus 로고    scopus 로고
    • Physical layer wireless security made fast and channel independent
    • Shanghai, China, Apr.
    • S. Gollakota and D. Katabi, "Physical layer wireless security made fast and channel independent," in INFOCOM'11, Shanghai, China, Apr. 2011.
    • (2011) INFOCOM'11
    • Gollakota, S.1    Katabi, D.2
  • 9
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography. I. Secret sharing
    • R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography. i. secret sharing," IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121-1132, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 13
    • 84861623350 scopus 로고    scopus 로고
    • Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
    • Orlando, FL, Mar.
    • H. Liu, J. Yang, Y. Wang, and Y. Chen, "Collaborative secret key extraction leveraging received signal strength in mobile wireless networks," in IEEE INFOCOM'12, Orlando, FL, Mar. 2012.
    • (2012) IEEE INFOCOM'12
    • Liu, H.1    Yang, J.2    Wang, Y.3    Chen, Y.4
  • 14
    • 84879516937 scopus 로고    scopus 로고
    • ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks
    • Budapest, Hungary, Apr.
    • S. Lu, J. Yuan, S. Yu, and M. Li, "ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks," in ACM WiSec'13, Budapest, Hungary, Apr. 2013.
    • (2013) ACM WiSec'13
    • Lu, S.1    Yuan, J.2    Yu, S.3    Li, M.4
  • 15
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sep.
    • R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. on Information Forensics and Security, vol. 2, no. 3, pp. 364-375, Sep. 2007.
    • (2007) IEEE Trans. on Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.3
  • 16
    • 51449114762 scopus 로고    scopus 로고
    • Secure wireless communications: Secret keys through multipath
    • A. Sayeed and A. Perrig, "Secure wireless communications: Secret keys through multipath," in ICASSP'08, 2008.
    • (2008) ICASSP'08
    • Sayeed, A.1    Perrig, A.2
  • 17
    • 84881509221 scopus 로고    scopus 로고
    • Key generation in two-way relay wireless channels
    • Baltimore, MD, USA
    • H. Zhou, L. Huie, and L. Lai, "Key generation in two-way relay wireless channels," in CISS'13, Baltimore, MD, USA, 2013.
    • (2013) CISS'13
    • Zhou, H.1    Huie, L.2    Lai, L.3
  • 18
    • 84883029780 scopus 로고    scopus 로고
    • Social trust and social reciprocity based cooperative d2d communications
    • Bangalore, India
    • X. Chen, B. Proulx, X. Gong, and J. Zhang, "Social trust and social reciprocity based cooperative d2d communications," in MobiHoc'13, Bangalore, India, 2013.
    • (2013) MobiHoc'13
    • Chen, X.1    Proulx, B.2    Gong, X.3    Zhang, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.