2011 XXXth URSI General Assembly and Scientific Symposium 2011
DOI: 10.1109/ursigass.2011.6050501
|View full text |Cite
|
Sign up to set email alerts
|

Experimental validation of wireless secret key agreement using array antennas

Abstract: This paper considers the problem of wireless secret key agreement based on radio propagation characteristics, where two legitimate parties generate and share a secret key by exploiting the radio propagation characteristics between them in the presence of an eavesdropper. We developed an experimental system using array antennas to implement the wireless secret key agreement. In this paper, we present the experimental system and validate basic characteristics that are fundamental for the wireless secret key agre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…The MIMO technique can be applied to communications and sensing or radar systems that are non-communicative, by employing MIMO propagation characteristics [94], [95]. There is also a scheme for secret key agreement based on radio propagation characteristics using array antennas that have been developed as a novel approach to this application [96].…”
Section: Mimo Propagation For Various Applicationsmentioning
confidence: 99%
“…The MIMO technique can be applied to communications and sensing or radar systems that are non-communicative, by employing MIMO propagation characteristics [94], [95]. There is also a scheme for secret key agreement based on radio propagation characteristics using array antennas that have been developed as a novel approach to this application [96].…”
Section: Mimo Propagation For Various Applicationsmentioning
confidence: 99%
“…By a similar argument we have that Pr(J 1 ) → 0. Since H(φ A ) ≤ K(I(u BA ; ĥBA | ĥAB ) + 2ε) and since the rate constraint (18) is imposed, terminal B decodes φ A with high probability. In similar fashion it can be argued that Pr(J 2 ) → 0 as K → ∞.…”
Section: F Equivocation Analysismentioning
confidence: 99%
“…A number of experimental testbeds already demonstrate practical viability of such methods. See e..g., [13], [18]- [20].…”
Section: Introductionmentioning
confidence: 99%