2016
DOI: 10.1016/j.comnet.2016.06.013
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated key establishment for low-resource devices exploiting correlated random channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(23 citation statements)
references
References 34 publications
0
23
0
Order By: Relevance
“…The system does so by controlling the traffic flows of vulnerable devices, thus protecting other devices in the network from threats and preventing data leakage. Zenger et al [44] proposed a vicinity-based pairing mechanism that delegates trust from one node to another based on physical proximity. Messaging between devices can be authenticated using multiple communication channels (e.g.…”
Section: A Iot Device Identification and Authenticationmentioning
confidence: 99%
“…The system does so by controlling the traffic flows of vulnerable devices, thus protecting other devices in the network from threats and preventing data leakage. Zenger et al [44] proposed a vicinity-based pairing mechanism that delegates trust from one node to another based on physical proximity. Messaging between devices can be authenticated using multiple communication channels (e.g.…”
Section: A Iot Device Identification and Authenticationmentioning
confidence: 99%
“…In order to obtain correlated channel observations, key generation is usually studied with the aid of systems operating in time division duplexing (TDD) mode, e.g. Wi-Fi [6]- [9], ZigBee [4], [10]- [12], Bluetooth [13], and LoRa [14]- [16], etc. 2 A station is a device that supports Wi-Fi functions in the Wi-Fi terminology.…”
Section: Related Workmentioning
confidence: 99%
“…This technique generates keys between a pair of legitimate users with no assistance from a third party. Using a lightweight procedure, compared to the popular elliptic curve-based Diffie-Hellman (ECDH) PKC scheme, the results in [4] indicate that an ECDH protocol dissipates about 100 times more energy and imposes about 1000 times higher complexity than the key generation counterpart, when both are implemented by an 8bit Intel MCS-51 micro-controller. Key generation has also been proved to be information theoretically-secure, as it relies on the unpredictable random wireless channels [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, key generation is lightweight and uses limited resources as all of the operations are not complicated and thus meets the low computation capacity of IoT devices. Zenger et al implemented their key generation scheme in a 32-bit ARM Cortex M3 processor (EFM32GG-STK3700) and an 8-bit Intel MCS-51 and showed the resource and energy consumption to be very low [35]. The authors also implemented a lightweight PKC, elliptic curves Diffie-Hellman key generation (ECDH), as a comparison.…”
Section: Physical Layer Key Generationmentioning
confidence: 99%