2006 International Conference on Communication Technology 2006
DOI: 10.1109/icct.2006.341996
|View full text |Cite
|
Sign up to set email alerts
|

A Private Key Sharing Scheme Based on Multipath Time Delay in UWB Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…The channel fluctuations are created artificially by an electronic steerable parasitic antenna (ESPAR). In [6], the authors show that it is possible to extract secret keys based on the measurements of arrival time difference at both authorised users. However, this solution requires a specific antenna like in [3], [5], [8], [7] and an overhead bandwidth for the exchange phase to generate secret key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The channel fluctuations are created artificially by an electronic steerable parasitic antenna (ESPAR). In [6], the authors show that it is possible to extract secret keys based on the measurements of arrival time difference at both authorised users. However, this solution requires a specific antenna like in [3], [5], [8], [7] and an overhead bandwidth for the exchange phase to generate secret key.…”
Section: Related Workmentioning
confidence: 99%
“…The first bits extraction is based on fixed threshold which is set by A and B like in [3], [6], [5]. The principle of this algorithm is as follows: A and B compare the estimated received signal to the shared threshold, if the amplitude of the i th sample is below the threshold L the bit is set to 0 else it is set to 1.…”
Section: Studying the Impact Of Quantization Phasementioning
confidence: 99%
“…There are other types of CSI characteristics used for secret key generation, such as the arrival time differences of multipath components at receivers [7], or index of a reliably decoded layer for layered broadcast coded communication system [18]. This is not an exhaustive list of channel characteristics, but illustrates that different approaches are required to conduct side-channel analysis attacks during the CSI estimation.…”
Section: A Attacks During Csi Estimation and Key Bit Quantizationmentioning
confidence: 98%
“…In [3]- [4], secret keys are generated from the received signal strength indicator (RSSI) profile, extra randomness is added in with the help of an electronic steerable parasitic antenna (ESPAR). In [7], the secret keys are generated based on the arrival time difference measurements of multipath components at both legitimate users. It is shown in [8] that the secret key agreement can be ensured with the help of low-density parity-check (LDPC) codes.…”
Section: Introductionmentioning
confidence: 99%
“…In [4]- [5], secret keys are generated through exploiting the received signal strength indicator (RSSI) profile, using an electronically steerable parasitic antenna (ESPAR). In [8], the authors show that it is possible to extract secret keys based on the arrival time difference measurements of multipath components at both legitimate users. It is shown in [9], [10] that the secret key agreement can be ensured with the help of low-density paritycheck (LDPC) codes.…”
Section: Introductionmentioning
confidence: 99%