2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849502
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key Generation via Pulse-Coupled Synchronization

Abstract: A novel framework for sharing common randomness and generating secret keys in wireless networks is considered. In particular, a network of users equipped with pulse oscillators (POs) and coupling mechanisms in between is considered. Such mechanisms exist in synchronized biological and natural systems, and have been exploited to provide synchronization in distributed networks. We show that naturally-existing initial random phase differences between the POs in the network can be utilized to provide almost identi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…This, in turn, makes them unappealing for applications where nodes experience a static environment and have limited resources, e.g., IoT networks, sensor networks, etc. Also, solutions based on utilizing coupled dynamics existing in synchronization mechanisms [24], [25] and based on full-duplex communications [26] are proposed for low-complexity IoT networks, which are often limited to very short range communications.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This, in turn, makes them unappealing for applications where nodes experience a static environment and have limited resources, e.g., IoT networks, sensor networks, etc. Also, solutions based on utilizing coupled dynamics existing in synchronization mechanisms [24], [25] and based on full-duplex communications [26] are proposed for low-complexity IoT networks, which are often limited to very short range communications.…”
Section: A Related Workmentioning
confidence: 99%
“…Proof: This follows directly from the definition of universal hash functions, using equation (25) where the output hash table size is p.…”
Section: Privacy Amplification Consistency Checkingmentioning
confidence: 99%