The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1109/tvt.2018.2877201
|View full text |Cite
|
Sign up to set email alerts
|

Channel-Envelope Differencing Eliminates Secret Key Correlation: LoRa-Based Key Generation in Low Power Wide Area Networks

Abstract: This paper presents automatic key generation for long-range wireless communications in low power wide area networks (LPWANs), employing LoRa as a case study. Differential quantization is adopted to extract a high level of randomness. Experiments conducted both in an outdoor urban environment and in an indoor environment demonstrate that this key generation technique is applicable for LPWANs, and shows that it is able to reliably generate secure keys.Index Terms-Internet of Things, low power wide area networks,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 58 publications
(46 citation statements)
references
References 18 publications
(28 reference statements)
0
38
0
1
Order By: Relevance
“…The receiver calculates the power for each received transmission, through which the channel randomness can be exploited. LoRa extends key generation applications to unexplored long range communication scenarios [ 54 , 55 , 56 , 57 ]. For example, the distance between Alice and Bob is as high as 1.5 km in the experiments of [ 56 ].…”
Section: Bringing Crkg Into the Field: Securing Practical Iot Commmentioning
confidence: 99%
See 1 more Smart Citation
“…The receiver calculates the power for each received transmission, through which the channel randomness can be exploited. LoRa extends key generation applications to unexplored long range communication scenarios [ 54 , 55 , 56 , 57 ]. For example, the distance between Alice and Bob is as high as 1.5 km in the experiments of [ 56 ].…”
Section: Bringing Crkg Into the Field: Securing Practical Iot Commmentioning
confidence: 99%
“…A LoRa-based key generation system is designed in [ 54 ]. The LoRa node consists of an Arduino and a LoRa Shield which uses SX1276 as the LoRa transceiver.…”
Section: Bringing Crkg Into the Field: Securing Practical Iot Commmentioning
confidence: 99%
“…In order to obtain correlated channel observations, key generation is usually studied with the aid of systems operating in time division duplexing (TDD) mode, e.g. Wi-Fi [6]- [9], ZigBee [4], [10]- [12], Bluetooth [13], and LoRa [14]- [16], etc. 2 A station is a device that supports Wi-Fi functions in the Wi-Fi terminology.…”
Section: Related Workmentioning
confidence: 99%
“…The National Institute of Standards and Technology (NIST) randomness test suite [31] is a popular tool for evaluating the randomness of the output of the random number generator (RNG) and pseudo random number generator (PRNG). It has been widely used in the key generation research area [8]- [10], [12]- [14], [17], [21], [28], [30], and it is also adopted in this paper.…”
Section: Metricsmentioning
confidence: 99%
“…RFF identification and key generation thus have attracted much research interest (see [2], [3] and references therein). The authors have carried out extensive work in these areas including RFF identification for ZigBee [5], [6], key generation for WiFi [7], [8] and LoRa [9]. This paper firstly reviews the RFF identification protocol.…”
Section: Introductionmentioning
confidence: 99%