메뉴 건너뛰기




Volumn 53, Issue 6, 2015, Pages 33-39

Physical layer key generation in wireless networks: Challenges and opportunities

Author keywords

[No Author keywords available]

Indexed keywords

FADING CHANNELS; INFORMATION THEORY; MOBILE SECURITY; RANDOM PROCESSES;

EID: 84933522482     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2015.7120014     Document Type: Article
Times cited : (251)

References (15)
  • 1
    • 0029234878 scopus 로고
    • Unconventional cryptographic keying variable management
    • Jan.
    • J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional Cryptographic Keying Variable Management," IEEE Trans. Commun., vol. 43, no. 1, Jan 1995, pp. 3-6.
    • (1995) IEEE Trans. Commun. , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.1    Hassan, A.2    Yarlagadda, R.3
  • 2
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana et al., "On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments," Proc. 15th ACM Annual Int'l. Conf. Mobile Computing and Networking '09, 2009, pp. 321-32.
    • (2009) Proc. 15th ACM Annual int'L. Conf. Mobile Computing and Networking '09 , pp. 321-332
    • Jana, S.1
  • 3
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • Jan.
    • N. Patwari et al., "High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements," IEEE Trans. Mobile Computing, vol. 9, no. 1, Jan. 2010, pp. 17-30.
    • (2010) IEEE Trans. Mobile Computing , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1
  • 4
    • 84881015585 scopus 로고    scopus 로고
    • Adaptive wireless channel probing for shared key generation based on pid controller
    • Sept.
    • Y. Wei, K. Zeng, and P. Mohapatra, "Adaptive Wireless Channel Probing for Shared Key Generation Based on Pid Controller," IEEE Trans. Mobile Computing, vol. 12, no. 9, Sept. 2013, pp. 1842-52.
    • (2013) IEEE Trans. Mobile Computing , vol.12 , Issue.9 , pp. 1842-1852
    • Wei, Y.1    Zeng, K.2    Mohapatra, P.3
  • 5
    • 84908542982 scopus 로고    scopus 로고
    • Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices
    • Dec.
    • S. Ali, V. Sivaraman, and D. Ostry, "Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices," IEEE Trans. Mobile Comp., vol. 13, no. 12, Dec. 2014, pp. 2763-76.
    • (2014) IEEE Trans. Mobile Comp. , vol.13 , Issue.12 , pp. 2763-2776
    • Ali, S.1    Sivaraman, V.2    Ostry, D.3
  • 6
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • K. Zeng et al., "Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks," Proc. IEEE INFOCOM '10, 2010, pp. 1837-45.
    • (2010) Proc. IEEE INFOCOM '10 , pp. 1837-1845
    • Zeng, K.1
  • 7
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • May
    • U. M. Maurer, "Secret Key Agreement by Public Discussion from Common Information," IEEE Trans. Info. Theory, vol. 39, no. 3, May 1993, pp. 733-42.
    • (1993) IEEE Trans. Info. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.M.1
  • 10
    • 84867755583 scopus 로고    scopus 로고
    • Limitations of generating a secret key using wireless fading under active adversary
    • Oct.
    • M. Zafer, D. Agrawal, and M. Srivatsa, "Limitations of Generating a Secret Key Using Wireless Fading under Active Adversary," IEEE/ACM Trans. Networking, vol. 20, no. 5, Oct. 2012, pp. 1440-51.
    • (2012) IEEE/ACM Trans. Networking , vol.20 , Issue.5 , pp. 1440-1451
    • Zafer, M.1    Agrawal, D.2    Srivatsa, M.3
  • 11
    • 84865611232 scopus 로고    scopus 로고
    • A practical man-in-The-middle attack on signal-based key generation protocols
    • S. Foresti, M. Yung, and F. Martinelli, Eds., Springer
    • S. Eberz et al., "A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols," Proc. ESORICS, LNCS, S. Foresti, M. Yung, and F. Martinelli, Eds., vol. 7459. Springer, 2012, pp. 235-52.
    • (2012) Proc. ESORICS, LNCS , vol.7459 , pp. 235-252
    • Eberz, S.1
  • 12
    • 84908510422 scopus 로고    scopus 로고
    • Group secret key generation via received signal strength: Protocols, achievable rates, and implementation
    • Dec.
    • H. Liu et al., "Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation," IEEE Trans. Mobile Computing, vol. 13, no. 12, Dec. 2014, pp. 2820-35.
    • (2014) IEEE Trans. Mobile Computing , vol.13 , Issue.12 , pp. 2820-2835
    • Liu, H.1
  • 13
    • 84984908109 scopus 로고    scopus 로고
    • Practical secret key agreement for full-duplex near field communications
    • R. Jin et al., "Practical Secret Key Agreement for Full-Duplex Near Field Communications," Proc. 9th ACM Symp. Info., Comp. and Commun. Security, 2014, pp. 217-28.
    • (2014) Proc. 9th ACM Symp. Info., Comp. and Commun. Security , pp. 217-228
    • Jin, R.1
  • 15
    • 76849098534 scopus 로고    scopus 로고
    • Pska: Usable and secure key agreement scheme for body area networks
    • Jan.
    • K. K. Venkatasubramanian et al., "Pska: Usable and Secure Key Agreement Scheme for Body Area Networks," IEEE Trans. Info. Tech. Biomed., vol. 14, no. 1, Jan. 2010, pp. 60-68.
    • (2010) IEEE Trans. Info. Tech. Biomed. , vol.14 , Issue.1 , pp. 60-68
    • Venkatasubramanian, K.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.