2016
DOI: 10.1109/tifs.2016.2543687
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Key Extraction From Measuring Physical Quantities

Abstract: Abstract-Key extraction via measuring a physical quantity is a class of information theoretic key exchange protocols that rely on the physical characteristics of the communication channel, to enable the computation of a shared key by two parties that share no prior secret information. The key is supposed to be information theoretically hidden to an eavesdropper. Despite the recent surge of research activity in the area, concrete claims about the security of the protocols typically rely on channel abstractions … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
22
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(23 citation statements)
references
References 45 publications
1
22
0
Order By: Relevance
“…[6] -A multitude of open research questions are formulated in recent works [3,4,5,6,8], all wondering about open, unaddressed issues in previous security analyses and adversarial models of physical-layer security schemes. We collect and address all these questions and present the first pairing protocol tailored for low-cost resourceconstrained wireless platforms and resistant against strong, active attackers.…”
Section: Challenges and Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…[6] -A multitude of open research questions are formulated in recent works [3,4,5,6,8], all wondering about open, unaddressed issues in previous security analyses and adversarial models of physical-layer security schemes. We collect and address all these questions and present the first pairing protocol tailored for low-cost resourceconstrained wireless platforms and resistant against strong, active attackers.…”
Section: Challenges and Contributionsmentioning
confidence: 99%
“…syndrome-based secure sketch with BCH codes as proposed in [29] for reconciliation and [5]. Here, we consider a (255, 131, 37)-BCH code.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…We roughly categorize them into three types: (i) lightweight encryption schemes [21,22,23,24]; (ii) generating artificial noise to limit the amount of information that can be extracted by eavesdroppers [25,26,27]; and (iii) mitigating the eavesdropping risk by controlling the transmitting power [28]. Table 1 summarizes these schemes.…”
Section: Related Workmentioning
confidence: 99%
“…Table 1 summarizes these schemes. In particular, a number of lightweight encryption schemes based on physical layer features of wireless networks have been proposed [21,22,23,24]. The main idea of physical-layer encryption schemes is to exploit the inherent randomness of communication channels so that the amount of information that can be extracted by an eavesdropper is mitigated.…”
Section: Related Workmentioning
confidence: 99%
“…Also, lossy schemes need to communicate to select samples and increase the robustness of their key generation. However, Edman et al [6] stated that such reconciliation requires interaction that may result in potentially zeroing the conditional entropy 3 and Eberz et al [5] successfully attacked a guard-band-based quantization scheme, demonstrating that strong characteristics may be observed by a passive adversary.…”
Section: Practice-oriented Quantization Protocols Under Testmentioning
confidence: 99%