2015 IEEE 16th International Conference on Communication Technology (ICCT) 2015
DOI: 10.1109/icct.2015.7399967
|View full text |Cite
|
Sign up to set email alerts
|

Pre-process method for reducing initial bit mismatch rate in secret key generation based on wireless channel characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Its primary aim is to make the two users agree upon the same key. IR methods consist of protocol based approaches [31][32][33][34][35] and code based approaches [36][37][38][39][40][41]. A protocol based approach is a two-way scheme in which communication takes place between Alice and Bob for error correction of key bits, until they agree upon a common key.…”
Section: Information Reconciliationmentioning
confidence: 99%
See 1 more Smart Citation
“…Its primary aim is to make the two users agree upon the same key. IR methods consist of protocol based approaches [31][32][33][34][35] and code based approaches [36][37][38][39][40][41]. A protocol based approach is a two-way scheme in which communication takes place between Alice and Bob for error correction of key bits, until they agree upon a common key.…”
Section: Information Reconciliationmentioning
confidence: 99%
“…In this, BMR decreases to 0.39 and the information rate increases to 0.42 with respect to winnow protocol with BMR of 0.5 and information rate of 0.42. In [34] pre-processing method is used which is valid when the BMR is greater than 0.1. The data rate is improved more than 37 times when the original BMR = 0.3.…”
Section: Information Reconciliationmentioning
confidence: 99%
“…Generating a random number random1. When random1> pulse rate, then a random walk method is utilized to locally search about the bat for generating a new solution, as explained in the next equation: ... (4) Where denotes a random solution selected from the current optimal solutions, is a random vector which is selected from [1, -1], and A t denotes the loudness.…”
Section: Bat-inspired Algorithmmentioning
confidence: 99%
“…The entropy of PRNGs output sequences is coming from the seeds, whilst the TRNGs entropy is coming from the physical signals 3 . This means the PRNGs are only capable of decreasing the entropy or remaining identical 4 . If the seeds of PRNGs are controlled or known via an attacker, then it is possible to predict the PRNGs output sequences, and this case represents the low entropy secret leakage 5 .…”
Section: Introductionmentioning
confidence: 99%