메뉴 건너뛰기




Volumn 13, Issue 12, 2014, Pages 2820-2835

Group secret key generation via received signal strength: Protocols, achievable rates, and implementation

Author keywords

Collaborative secret key extraction; group key extraction; mobile wireless network; received signal strength

Indexed keywords

GROUP KEY; GROUP SECRET KEY; MOBILE WIRELESS NETWORK; RECEIVED SIGNAL STRENGTH; SECRET KEY;

EID: 84908510422     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2014.2310747     Document Type: Article
Times cited : (142)

References (41)
  • 2
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • Nov.
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless Secret Key Generation Exploiting Reactance-Domain Scalar Response of Multipath Fading Channels," IEEE Trans. Antennas and Propagation, vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
    • (2005) IEEE Trans. Antennas and Propagation , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 3
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana, S. Premnath, M. Clark, S. Kasera, N. Patwari, and S. Krishnamurthy, "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. ACM Mobi-Com, pp. 321-332, 2009.
    • (2009) Proc. ACM Mobi-Com , pp. 321-332
    • Jana, S.1    Premnath, S.2    Clark, M.3    Kasera, S.4    Patwari, N.5    Krishnamurthy, S.6
  • 4
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radio-Telepathy: Extracting A Secret Key from an Unauthenticated Wireless Channel," Proc. ACM MobiCom, pp. 128-139, 2008.
    • (2008) Proc. ACM MobiCom , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 6
    • 79960885380 scopus 로고    scopus 로고
    • Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
    • Q. Wang, H. Su, K. Ren, and K. Kim, "Fast and Scalable Secret Key Generation Exploiting Channel Phase Randomness in Wireless Networks," Proc. IEEE INFOCOM, 2011.
    • (2011) Proc. IEEE INFOCOM
    • Wang, Q.1    Su, H.2    Ren, K.3    Kim, K.4
  • 7
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • Jan.
    • N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17-30, Jan. 2010.
    • (2010) IEEE Trans. Mobile Computing , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.4
  • 9
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • K. Zeng, D. Wu, A. Chan, and P. Mohapatra, "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," Proc. IEEE INFOCOM, pp. 1-9, 2010.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Zeng, K.1    Wu, D.2    Chan, A.3    Mohapatra, P.4
  • 11
    • 84908525765 scopus 로고    scopus 로고
    • Self-certified group key generation for ad hoc clusters in wireless sensor networks
    • O. Arazi and H. Qi, "Self-Certified Group Key Generation for Ad Hoc Clusters in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Arazi, O.1    Qi, H.2
  • 13
    • 78649346776 scopus 로고    scopus 로고
    • Secret key generation for a pairwise independent network model
    • Dec.
    • S. Nitinawarat, C. Ye, A. Barg, P. Narayan, and A. Reznik, "Secret Key Generation for a Pairwise Independent Network Model," IEEE Trans. Information Theory, vol. 56, no. 12, pp. 6482-6489, Dec. 2010.
    • (2010) IEEE Trans. Information Theory , vol.56 , Issue.12 , pp. 6482-6489
    • Nitinawarat, S.1    Ye, C.2    Barg, A.3    Narayan, P.4    Reznik, A.5
  • 14
    • 78649383176 scopus 로고    scopus 로고
    • Perfect omniscience, perfect secrecy, and steiner tree packing
    • Dec.
    • S. Nitinawarat and P. Narayan, "Perfect Omniscience, Perfect Secrecy, and Steiner Tree Packing," IEEE Trans. Information Theory, vol. 56, no. 12, pp. 6490-6500, Dec. 2010.
    • (2010) IEEE Trans. Information Theory , vol.56 , Issue.12 , pp. 6490-6500
    • Nitinawarat, S.1    Narayan, P.2
  • 17
    • 70449479022 scopus 로고    scopus 로고
    • Secure physical layer key generation schemes: Performance and information theoretic limits
    • J. Wallace, "Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits," Proc. IEEE Int'l Conf. Comm. (ICC), pp. 1-5, 2009.
    • (2009) Proc. IEEE Int'l Conf. Comm. (ICC) , pp. 1-5
    • Wallace, J.1
  • 19
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • Mar.
    • U. Maurer and S. Wolf, "Unconditionally Secure Key Agreement and the Intrinsic Conditional Information," IEEE Trans. Information Theory, vol. 45, no. 2, pp. 499-514, Mar. 1999.
    • (1999) IEEE Trans. Information Theory , vol.45 , Issue.2 , pp. 499-514
    • Maurer, U.1    Wolf, S.2
  • 20
    • 70449469434 scopus 로고    scopus 로고
    • Minimum energy per bit for secret key acquisition over multipath wireless channels
    • S. Draper, A. Sayeed, and T. Chou, "Minimum Energy per Bit for Secret Key Acquisition over Multipath Wireless Channels," Proc. IEEE Int'l Symp. Information Theory (ISIT), pp. 2296-2300, 2009.
    • (2009) Proc. IEEE Int'l Symp. Information Theory (ISIT) , pp. 2296-2300
    • Draper, S.1    Sayeed, A.2    Chou, T.3
  • 21
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • Jan.
    • J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management," IEEE Trans. Comm., vol. 43, no. 1, pp. 3-6, Jan. 1995.
    • (1995) IEEE Trans. Comm. , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.1    Hassan, A.2    Yarlagadda, R.3
  • 24
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sept.
    • R. Wilson, D. Tse, and R. Scholtz, "Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels," IEEE Trans. Information Forensics and Security, vol. 2, no. 3, pp. 364-375, Sept. 2007.
    • (2007) IEEE Trans. Information Forensics and Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.3
  • 27
    • 0033891095 scopus 로고    scopus 로고
    • Common randomness and secret key generation with a helper
    • Mar.
    • I. Csiszar and P. Narayan, "Common Randomness and Secret Key Generation with a Helper," IEEE Trans. Information Theory, vol. 46, no. 2, pp. 344-366, Mar. 2000.
    • (2000) IEEE Trans. Information Theory , vol.46 , Issue.2 , pp. 344-366
    • Csiszar, I.1    Narayan, P.2
  • 28
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszar and R. Ahlswede, "Secrecy Capacities for Multiple Terminals," IEEE Trans. Information Theory, vol. 50, no. 12, pp. 3046-3061, Dec. 2004.
    • (2004) IEEE Trans. Information Theory , vol.50 , Issue.12 , pp. 3046-3061
    • Csiszar, I.1    Ahlswede, R.2
  • 30
    • 84883056247 scopus 로고    scopus 로고
    • Extracting secret key from wireless link dynamics in vehicular environments
    • X. Zhu, F. Xu, E. Novak, C.C. Tan, Q. Li, and G. Chen, "Extracting Secret Key from Wireless Link Dynamics in Vehicular Environments," Proc. IEEE INFOCOM, 2013.
    • (2013) Proc. IEEE INFOCOM
    • Zhu, X.1    Xu, F.2    Novak, E.3    Tan, C.C.4    Li, Q.5    Chen, G.6
  • 33
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, part I: Secret sharing
    • July
    • R. Ahlswede and I. Csiszar, "Common Randomness in Information Theory and Cryptography, Part I: Secret Sharing," IEEE Trans. Information Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.
    • (1993) IEEE Trans. Information Theory , vol.39 , Issue.4 , pp. 1121-1132
    • Ahlswede, R.1    Csiszar, I.2
  • 34
    • 0037396695 scopus 로고    scopus 로고
    • Secret key agreement over a non-authenticated channel Part III
    • Apr.
    • U. Maurer and S. Wolf, "Secret Key Agreement over a Non-Authenticated Channel Part III," IEEE Trans. Information Theory, vol. 49, no. 4, pp. 822-851, Apr. 2003.
    • (2003) IEEE Trans. Information Theory , vol.49 , Issue.4 , pp. 822-851
    • Maurer, U.1    Wolf, S.2
  • 35
    • 10644270917 scopus 로고    scopus 로고
    • Secrecy capacities for multiple terminals
    • Dec.
    • I. Csiszar and P. Narayan, "Secrecy Capacities for Multiple Terminals," IEEE Trans. Information Theory, vol. 50, no. 12, pp. 3047-3061, Dec. 2004.
    • (2004) IEEE Trans. Information Theory , vol.50 , Issue.12 , pp. 3047-3061
    • Csiszar, I.1    Narayan, P.2
  • 36
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Information Theory, vol. 39, no. 3, pp. 733-742, May. 1993.
    • (1993) IEEE Trans. Information Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 41
    • 84861623350 scopus 로고    scopus 로고
    • Collaborative secret key extraction leveraging received signal strength in mobile wireless networks
    • H. Liu, J. Yang, Y. Wang, and Y. Chen, "Collaborative Secret Key Extraction Leveraging Received Signal Strength in Mobile Wireless Networks," Proc. IEEE INFOCOM, pp. 927-935, 2012.
    • (2012) Proc. IEEE INFOCOM , pp. 927-935
    • Liu, H.1    Yang, J.2    Wang, Y.3    Chen, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.