2013
DOI: 10.1109/tifs.2012.2226718
|View full text |Cite
|
Sign up to set email alerts
|

COKE Crypto-Less Over-the-Air Key Establishment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 33 publications
0
18
0
Order By: Relevance
“…ESC is inspired by COKE [1]: ESC leverages channel anonymity to build up a peer-to-peer key establishment protocol and provides security at a network level, even in presence of multiple adversaries. In particular, we derive a theoretical lower bound for the security provided by our solution and support our findings with extensive simulation results.…”
Section: Contributionmentioning
confidence: 99%
See 4 more Smart Citations
“…ESC is inspired by COKE [1]: ESC leverages channel anonymity to build up a peer-to-peer key establishment protocol and provides security at a network level, even in presence of multiple adversaries. In particular, we derive a theoretical lower bound for the security provided by our solution and support our findings with extensive simulation results.…”
Section: Contributionmentioning
confidence: 99%
“…Another solution comes from asymmetric cryptographic primitives, such as [16], nevertheless, asymmetric crypto is computationally expensive, and therefore, not suitable for massive devices deployment such as wireless sensor networks or devices that, once deployed, will be substantially unattendedoperating life being at premium. On-line key establishment without leveraging asymmetric crypto is a challenging issue that can be solved in mainly two ways: RSS based key establishment [7] or by means of anonymous channels [1,11,12]. The former solves the key establishment issue by transforming the observation of the RSS values in a shared secret: it has been proved that the received signal power estimated at both the peers of a communication link can be "transformed" on a shared secret between the two peers.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations