The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2014 International Workshop on Secure Internet of Things 2014
DOI: 10.1109/siot.2014.7
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Key Generating Architecture for Wireless Low-Resource Devices

Abstract: Secret key establishment based on parameters of the communication channel is a highly attractive option for many applications that operate in a dynamic mobile environment with peer-to-peer association. On the other hand, high usability and dynamic key management are still very difficult to achieve for wireless devices which have to operate under strict resource constraints. In fact, most previously reported key generation methods cannot operate in such environment. In this work, we present a new system archite… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(26 citation statements)
references
References 28 publications
0
25
0
Order By: Relevance
“…While many works have focused on extracting secret keys (e.g. to be used for encryption and decryption of user data), such as [7], [8], [9], the focus of our work is to identify the original transmitter of data packets by exploiting the related PHY metadata.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…While many works have focused on extracting secret keys (e.g. to be used for encryption and decryption of user data), such as [7], [8], [9], the focus of our work is to identify the original transmitter of data packets by exploiting the related PHY metadata.…”
Section: Related Workmentioning
confidence: 99%
“…As it is in some cases necessary to reduce the dimensionality M of the the input feature in order to avoid overfitting or underfitting, we also add a preprocessing step for that purpose. This reduces the number of features of the original sample from M = 48 to M red ∈ [1,2,3,4,6,8,12,16,24,48] by either sampling the original feature vector at the respective rate yielding F red (k, ℓ * ) = F (k, ℓ * M M red ), ℓ * = 0, . .…”
Section: B Data Processing Pipelinementioning
confidence: 99%
“…the AP and an ED, estimate the channel characteristics they experience mutually for a specific amount of time in order to derive a shared secret which can be used as a session key for ciphering (this approach has e.g. been considered in [Guillaume et al (2015)], [Zenger et al (2014)] and [Wilhelm et al (2013)]). Let the channel estimated by the ED due to the AP at time k be H AP-ED are equal when they are conducted during the coherence time of the channel and in the absence of errors (e.g.…”
Section: Secret Key Generationmentioning
confidence: 99%
“…In [2] a good overview on this topic is given. While many works have focused on extracting secret keys between two communicating devices, such as [3], [4], [5], the focus of our work is on guaranteeing secure transmission with respect to authenticity of data packets from one device to another. One of the first works considering that idea has been for example [6], where an approach based on simulation of the wireless channel and hypothesis testing is presented for static scenarios and is later in [7] extended to time-variant scenarios.…”
Section: Related Workmentioning
confidence: 99%