메뉴 건너뛰기




Volumn , Issue , 2014, Pages 350-359

KEEP: Fast secret key extraction protocol for D2D communication

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; EXTRACTION; ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING; QUALITY OF SERVICE;

EID: 84907897603     PISSN: 1548615X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWQoS.2014.6914340     Document Type: Conference Paper
Times cited : (87)

References (32)
  • 3
    • 85027496257 scopus 로고
    • Secret-key reconciliation by public discussion
    • Springer
    • G. Brassard and L. Sal vail. "Secret-key reconciliation by public discussion." In Advances in Cryptology-Eurocrypt, pages 410-423. Springer, 1 994.
    • (1994) Advances in Cryptology-Eurocrypt , pp. 410-423
    • Brassard, G.1    Salvail, L.2
  • 4
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • H. Chan, A. Perrig, and D. Song. "Random key predistribution schemes for sensor networks". In Symposium on Security and Privacy, pages 197-2 1 3, 2003.
    • (2003) Symposium on Security and Privacy , vol.1 , Issue.3 , pp. 197-2
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 5
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Springer
    • Y. Dodis, L. Reyzin, and A. Smith. "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data". In Advances in Cryptology-Eurocrypt, pages 523-540. Springer, 2004.
    • (2004) Advances in Cryptology-Eurocrypt , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 8
    • 84907893332 scopus 로고    scopus 로고
    • Proximate: Proximity-based secure pairing using ambient wireless signals
    • T. Heartbeats. "Proximate: Proximity-based secure pairing using ambient wireless signals." IEEE Wireless Communications, page 8, 20ll.
    • (2011) IEEE Wireless Communications , pp. 8
    • Heartbeats, T.1
  • 10
    • 0024866111 scopus 로고
    • Pseudo-random generation from one-way functions
    • R. Impagliazzo, L. Levin, and M. Luby. "Pseudo-random generation from one-way functions." In ACM STOC, pages 12-24, 1989.
    • (1989) ACM STOC , pp. 12-24
    • Impagliazzo, R.1    Levin, L.2    Luby, M.3
  • 11
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy. "On the effectiveness of secret key extraction from wireless signal strength in real environments." In ACM MobiCom, pages 321-332, 2009.
    • (2009) ACM MobiCom , pp. 321-332
    • Jana, S.1    Premnath, S.2    Clark, M.3    Kasera, S.4    Patwari, N.5    Krishnamurthy, S.6
  • 12
    • 33645989774 scopus 로고    scopus 로고
    • Distributed collaborative key agreement and authentication protocols for dynamic peer groups
    • P. Lee, J. Lui, and D. Yau. "Distributed collaborative key agreement and authentication protocols for dynamic peer groups." IEEElACM Tran. on Networking, 14(2) :263-276, 2006.
    • (2006) IEEElACM Tran. on Networking , vol.14 , Issue.2 , pp. 263-276
    • Lee, P.1    Lui, J.2    Yau, D.3
  • 13
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • M. Li, W. Lou, and K. Ren. "Data security and privacy in wireless body area networks." IEEE Wireless Communications, 17(1) : 5 1-58, 20 10.
    • (2010) IEEE Wireless Communications , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 15
    • 84866269425 scopus 로고    scopus 로고
    • Exploiting channel diversity in secret key generation from multipath fading randomness
    • Y. Liu, S. Draper, and A. Sayeed. "Exploiting channel diversity in secret key generation from multipath fading randomness." IEEE Trans. on Information Forensics and Security, PP(99): I, 2012.
    • (2012) IEEE Trans. on Information Forensics and Security , vol.1 , pp. 99
    • Liu, Y.1    Draper, S.2    Sayeed, A.3
  • 16
    • 60149097098 scopus 로고    scopus 로고
    • Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. "Radiotelepathy: extracting a secret key from an unauthenticated wireless channel." In ACM MobiCom, pages 128-139, 2008.
    • (2008) ACM MobiCom , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 17
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-part iii: Privacy amplification
    • Apr.
    • U. Maurer and S. Wolf. "Secret-key agreement over unauthenticated public channels-part iii: Privacy amplification." IEEE Tran. on Information Theory, 49(4): 839-851, Apr. 2003.
    • (2003) IEEE Tran. on Information Theory , vol.49 , Issue.4 , pp. 839-851
    • Maurer, U.1    Wolf, S.2
  • 18
    • 77955667690 scopus 로고    scopus 로고
    • Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis
    • J. Wallace and R. Sharma. "Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis." IEEE Tran. on Information Forensics and Security, 5(3) :381-392, 2010.
    • (2010) IEEE Tran. on Information Forensics and Security , vol.5 , Issue.3 , pp. 381-392
    • Wallace, J.1    Sharma, R.2
  • 19
    • 74549208614 scopus 로고    scopus 로고
    • On key agreement in wireless sensor networks based on radio transmission properties
    • M. Wilhelm, L Martinovic, and J. Schmitt. "On key agreement in wireless sensor networks based on radio transmission properties." In IEEE Workshop on Secure Network Protocols, pages 37-42, 2009.
    • (2009) IEEE Workshop on Secure Network Protocols , pp. 37-42
    • Wilhelm, M.1    Martinovic, L.2    Schmitt, J.3
  • 20
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe. "Using the physical layer for wireless authentication in time-variant channels." IEEE Tran. on Wireless Communications, 7(7) :2571-2579, 2008.
    • (2008) IEEE Tran. on Wireless Communications , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 22
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. Haas. "Securing ad hoc networks." IEEE Network, 13(6): 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 23
    • 3543056512 scopus 로고    scopus 로고
    • An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks
    • S. Zhu, S. Setia, S. Jajodia, and P. Ning. "An interleaved hop-byhop authentication scheme for filtering of injected false data in sensor networks." In IEEE Symposium on Security and Privacy, pages 259-27 1, 2004.
    • (2004) IEEE Symposium on Security and Privacy , pp. 259-271
    • Zhu, S.1    Setia, S.2    Jajodia, S.3    Ning, P.4
  • 24
    • 84943553152 scopus 로고    scopus 로고
    • Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
    • S. Zhu, S. Xu, S. Setia, and S. Jajodia. "Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach." In IEEE ICNP, pages 326-335, 2003.
    • (2003) IEEE ICNP , pp. 326-335
    • Zhu, S.1    Xu, S.2    Setia, S.3    Jajodia, S.4
  • 28
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • Aono, T. and Higuchi, K. and Ohira, T. and Komiyama, B. and Sasaoka, H. "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Tran. on Antennas and Propagation, vol. 53, pages 3776-3784, 2005.
    • (2005) IEEE Tran. on Antennas and Propagation , vol.53 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 29
    • 84883122633 scopus 로고    scopus 로고
    • Fast and practical secret key extraction by exploiting channel response
    • H. Liu, Y. Wang, J. Yang, and Y. Chen. "Fast and Practical Secret Key Extraction by Exploiting Channel Response." In IEEE INFOCOM, pages 31 48-3 156, 20 13.
    • (2013) IEEE Infocom , pp. 3148-3156
    • Liu, H.1    Wang, Y.2    Yang, J.3    Chen, Y.4
  • 31
    • 38049106551 scopus 로고    scopus 로고
    • Finding SHA-I characteristics : General results and applications
    • Springer
    • D. Christophe, and R. Christian. "Finding SHA-I characteristics : General results and applications." In Advances in Cryptology-ASIA CRYPT, pages 1-20. Springer, 2006.
    • (2006) Advances in Cryptology-ASIA CRYPT , pp. 1-20
    • Christophe, D.1    Christian, R.2
  • 32


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.