2020
DOI: 10.1109/access.2020.2970147
|View full text |Cite
|
Sign up to set email alerts
|

Ephemeral Secrets: Multi-Party Secret Key Acquisition for Secure IEEE 802.11 Mobile Ad Hoc Communication

Abstract: Mobile ad hoc networks consist of wireless nodes and can be established quickly with minimal configuration and cost, because, they do not require any infrastructure in advance. Civil and military applications are using them extensively in emergency and mission-oriented scenarios respectively as multi-party communication systems. Whereas, the multi-party secret key acquisition is one of the acute issues in these low resource wireless ad hoc networks, especially, which are based on IEEE 802.11ah and IEEE 802.11b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 65 publications
0
5
0
Order By: Relevance
“…Present security solutions are computationally secure, but with sufficient resources, they can be breached. There are information-theoretic cryptography solutions that are resilient against the large computing power of an adversary [79], such as quantum key distribution and secret key generation using information-theoretic perspectives of wireless physical or MAC layer characteristics for use in the future [80].…”
Section: Plos Onementioning
confidence: 99%
“…Present security solutions are computationally secure, but with sufficient resources, they can be breached. There are information-theoretic cryptography solutions that are resilient against the large computing power of an adversary [79], such as quantum key distribution and secret key generation using information-theoretic perspectives of wireless physical or MAC layer characteristics for use in the future [80].…”
Section: Plos Onementioning
confidence: 99%
“…The shared secret computed using the Weil pairing should be hard to drive given the public keys (P A, QA), (P B, QB), and (P C, QC) are available to adversaries. But such security solutions, while computationally secure, may be vulnerable to breaches with powerful adversaries, while information-theoretic cryptography solutions will offer resilience in the future [36].…”
Section: Proposed Modelmentioning
confidence: 99%
“…Among above mentioned researches [6][7][8][9][10] have investigated wireless radio channels' physical layer characteristics. They've found that wireless nodes can establish identical secret key acquisition by exploiting channel reciprocity and randomness.…”
Section: Introductionmentioning
confidence: 99%
“…This symmetric state remains identical for a brief period known as the coherence time, emphasizing the importance of timely key establishment in secure wireless communication [6][7][8]11 . In wireless communication's link layer, it's commonly believed that two nodes can't hear the exact same transmission unless they're within λ /2 distance 5,9,10,[17][18][19][20] . Practical observations reveal discrepancies due to wireless errors and environmental factors like multi-path fading and interference.…”
Section: Introductionmentioning
confidence: 99%