2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5934929
|View full text |Cite
|
Sign up to set email alerts
|

Fast and scalable secret key generation exploiting channel phase randomness in wireless networks

Abstract: Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Several interesting approaches have been developed and demonstrated for their feasibility. The state-of-the-art, however, still has much room for improving their practicality. This is because i) the key bit generation rate supported by most existing approaches is very low which significantly limits their practical usage given the intermittent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
165
0
1

Year Published

2014
2014
2018
2018

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 219 publications
(166 citation statements)
references
References 11 publications
0
165
0
1
Order By: Relevance
“…Some other works made some further steps to analyze security. For instance, [23], [24] consider performing randomness tests but these are insufficient as security guarantees (such "random" sequences are not necessarily unpredictable). In [20] a type of attacks based on blind deconvolution is considered and it is argued experimentally that such attacks are unlikely to apply; however, this does not preclude other types of attacks.…”
Section: A Related Work and Our Resultsmentioning
confidence: 99%
“…Some other works made some further steps to analyze security. For instance, [23], [24] consider performing randomness tests but these are insufficient as security guarantees (such "random" sequences are not necessarily unpredictable). In [20] a type of attacks based on blind deconvolution is considered and it is argued experimentally that such attacks are unlikely to apply; however, this does not preclude other types of attacks.…”
Section: A Related Work and Our Resultsmentioning
confidence: 99%
“…In the simulations, the signalto-noise ratio (SNR) is defined as 2 ℎ / 2 . The secret key capacity of the proposed secret key generation scheme is compared with the existing channelphase based secret key generation scheme [15] and channelgain based secret key generation scheme [14] in Figure 4. During channel probing, the channel condition of these three schemes is identical.…”
Section: The Secret Key Generationmentioning
confidence: 99%
“…In addition, the broadcasting nature of the wireless channels causes the wireless communication channel easily to be eavesdropped on or intercepted by an adversary [1,2]. Therefore, the interest in exploiting the characteristics of the wireless channels at the PHYlayer to enhance and complement the conventional security mechanisms is growing, such as the secret key extraction from the characteristics of wireless channels [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] and PHYlayer authentication [20][21][22][23][24][25][26][27].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since then, several tree-based algorithms have been developed to achieve the group secret key capacity for the multi-terminal pairwise independent network (PIN) [11]- [15]. On the other hand, effective group key generation algorithms have been proposed for wireless networks by exploiting channel characteristics in [28]- [30]. These algorithms are more practical for real systems at the expense of some scarification in the group key rate.…”
mentioning
confidence: 99%