Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2015
DOI: 10.4108/eai.22-7-2015.2260194
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of Quantization Schemes for Channel-based Key Extraction

Abstract: The use of reciprocal and random properties of wireless channels for the generation of secret keys is a highly attractive option for many applications that operate in a mobile environment. In recent years, several practice-oriented protocols have been proposed, but unfortunately without a sufficient and consistent security analysis and without a fair comparison between each other. This can be attributed to the fact that until now neither a common evaluation basis, nor a security metric in an on-line scenario (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
26
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(27 citation statements)
references
References 14 publications
1
26
0
Order By: Relevance
“…[6] -A multitude of open research questions are formulated in recent works [3,4,5,6,8], all wondering about open, unaddressed issues in previous security analyses and adversarial models of physical-layer security schemes. We collect and address all these questions and present the first pairing protocol tailored for low-cost resourceconstrained wireless platforms and resistant against strong, active attackers.…”
Section: Challenges and Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…[6] -A multitude of open research questions are formulated in recent works [3,4,5,6,8], all wondering about open, unaddressed issues in previous security analyses and adversarial models of physical-layer security schemes. We collect and address all these questions and present the first pairing protocol tailored for low-cost resourceconstrained wireless platforms and resistant against strong, active attackers.…”
Section: Challenges and Contributionsmentioning
confidence: 99%
“…8, key extraction starts with a synchronized block of channel measurements, which are quantized (quantize) applying the multilevel scheme by Jana et al [3]. The chosen quantization was recommended by Zenger et al [8] as a result of their security evaluation. In order to cope with disagreements due to imperfect channel-reciprocity, we utilize…”
Section: Protocol Specificationmentioning
confidence: 99%
“…To this end, a number of quantizer variants of the above two main approaches have been designed and tested. A comparison among different quantizers can be found in [119], [120].…”
Section: ) Summarymentioning
confidence: 99%
“…The quantization methods include binary quantization [10], adaptive secret bit generation [8], [15], differential quantization [16], non-uniform quantization [17] and multiple-bit quantization [18], [19], etc. The paper [20] summarizes some existing quantization methods. The preliminary key sequences obtained at Alice and Bob are often subject to discrepancies, particularly at very low SNR due to channel random noise and hardware limitations.…”
Section: The Channel Characteristic-based Secret Key Generationmentioning
confidence: 99%