2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6567117
|View full text |Cite
|
Sign up to set email alerts
|

Fast and practical secret key extraction by exploiting channel response

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
150
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 199 publications
(153 citation statements)
references
References 15 publications
3
150
0
Order By: Relevance
“…Indeed, there are many approaches to ensure channel reciprocity in wireless systems, such as interpolation and filtering [28]. The interpolation methods emulate the identical channel measurement times at the nodes [29,30] and the filtering methods eliminate the high frequency components in noise [31,32]. Unfortunately, these techniques are not perfect.…”
Section: Next Channel Number Generation Schemementioning
confidence: 99%
“…Indeed, there are many approaches to ensure channel reciprocity in wireless systems, such as interpolation and filtering [28]. The interpolation methods emulate the identical channel measurement times at the nodes [29,30] and the filtering methods eliminate the high frequency components in noise [31,32]. Unfortunately, these techniques are not perfect.…”
Section: Next Channel Number Generation Schemementioning
confidence: 99%
“…Therefore, randomness is the most important feature of the generated key sequence. We use National Institute of Standards and Technology (NIST) randomness test suite [27] to verify the randomness of the key sequence, which is also used by many other researchers [9], [10], [12], [13], [18].…”
Section: B Randomnessmentioning
confidence: 99%
“…Our work differs from [12], [13], which also extract keys from CSI. The work in [12] generates key from all the subcarriers.…”
Section: Introductionmentioning
confidence: 97%
See 2 more Smart Citations