IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference 2007
DOI: 10.1109/glocom.2007.41
|View full text |Cite
|
Sign up to set email alerts
|

Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks

Abstract: In this paper we present a signal processing methodology for sharing symmetric keys in personal area networks. Symmetric encryption and decryption are commonly used because of limitations in computing power and energy consumption. However, key sharing still imposes challenges regarding usability, computational complexity of algebraic key exchange algorithms, and security. Our approach is that keys are generated locally on devices by shaking them, and that the keys are equal if and only if the devices are shake… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 8 publications
(7 reference statements)
0
6
0
Order By: Relevance
“…When users shake devices together, the method [3] performs pairing by generating a common key necessary for encrypting transmission / reception data. This method generates a common key by combining the partial keys generated from the partial data sets of acceleration data.…”
Section: Pairing Methods Using Accelerometermentioning
confidence: 99%
See 2 more Smart Citations
“…When users shake devices together, the method [3] performs pairing by generating a common key necessary for encrypting transmission / reception data. This method generates a common key by combining the partial keys generated from the partial data sets of acceleration data.…”
Section: Pairing Methods Using Accelerometermentioning
confidence: 99%
“…Our proposed method does not need special camera such as infrared camera because of only recognizing the marker by a camera. • Can distinguish legitimate user from impersonator In [3], there is possibility that the impersonator outside the camera range can imitate the movement of the device of two users because this method generates common key from two acceleration data of two users directly. In [10,11], there is also possibility that the impersonator can perform illegal pairing by imitating the user's movement because inclination of device is not detected or calculated.…”
Section: Step 11: Calculate Similarity Between Displacement Data Andamentioning
confidence: 99%
See 1 more Smart Citation
“…This Candidate Key Protocol generates Feature sets with identical hash values at both devices and concatenates them to a shared secret key. A similar protocol that utilises rudimentary error correction of binary keys created by shaking processes is introduced in [1]. In [2], a false negative rate of more than 11 percent was Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 99%
“…Bichler D et al, 2007, [4] demonstrated that an RF Channel can serve as a device authentication mechanism. The channel property is spatially centered and is not predictable at any of the remote location.…”
Section: Key Generation Approach To Encrypt Wireless Communication Usmentioning
confidence: 99%