2010
DOI: 10.1109/tmc.2009.88
|View full text |Cite
|
Sign up to set email alerts
|

High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
256
0
2

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 349 publications
(260 citation statements)
references
References 19 publications
2
256
0
2
Order By: Relevance
“…A common characteristic of these works is that significant attention is given to demonstrate correctness (i.e., that Alice and Bob calculate the same key), and efficiency; much less formal analysis (as we detail below) is performed to demonstrate security. More specifically, the security of many of these works, e.g., [16], [18], [19], [23], directly relied on the assumption that if the adversary is a wavelength away from the communicating parties, the adversary's observation is independent of the parties' measurements. Some other works made some further steps to analyze security.…”
Section: A Related Work and Our Resultsmentioning
confidence: 99%
“…A common characteristic of these works is that significant attention is given to demonstrate correctness (i.e., that Alice and Bob calculate the same key), and efficiency; much less formal analysis (as we detail below) is performed to demonstrate security. More specifically, the security of many of these works, e.g., [16], [18], [19], [23], directly relied on the assumption that if the adversary is a wavelength away from the communicating parties, the adversary's observation is independent of the parties' measurements. Some other works made some further steps to analyze security.…”
Section: A Related Work and Our Resultsmentioning
confidence: 99%
“…To sample channel dynamics, two parties capture RSSI values by sending packets back and forth to each other. This will require addressing the following challenges that have rendered the previous approaches [5]- [8] unusable.…”
Section: Introductionmentioning
confidence: 99%
“…Measurements [9], [10] have shown that channel coherence time in vehicular environments can be as short as a few hundred microseconds. Although short coherence time will give high randomness for key extraction in low speed mobile environments [5]- [8], very short coherence time in vehicular environments will pose a big challenge to key extraction. This…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In deed, a lot of attention is being given to the physical layer of wireless communication. Interestingly, it has been found that the multipath phenomenon in wireless communication provides a sort of randomness and diversity that can be leveraged in extracting secret keys [4,5,6,7,8,9,10]. Actually, many real world measurements have shown that in Time Division Duplex (TDD) wireless communications, the multipath channel forms a reciprocal common source of randomness for any two communicating nodes; such that other nodes separated by distances greater than the order of a wavelength observe different multipath channels.…”
Section: Introductionmentioning
confidence: 99%