2013
DOI: 10.1109/tifs.2013.2278834
|View full text |Cite
|
Sign up to set email alerts
|

SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 61 publications
(41 citation statements)
references
References 29 publications
0
38
0
Order By: Relevance
“…The localization accuracy can be improved if the reader probes sufficient number of reference tags. Some applications for the vehicular networks are described in Quan et al 17 and Cheng et al 18 The security issues are discussed in Chen et al 19,20 System design and implementation…”
Section: Related Workmentioning
confidence: 99%
“…The localization accuracy can be improved if the reader probes sufficient number of reference tags. Some applications for the vehicular networks are described in Quan et al 17 and Cheng et al 18 The security issues are discussed in Chen et al 19,20 System design and implementation…”
Section: Related Workmentioning
confidence: 99%
“…They are both denoted as R r s in this paper. In order to facilitate discussion in this paper, the waveforms acquired at Alice and Bob used for key generation purpose in the SC-AF scheme are presented in (16) and (17).…”
Section: Sn Rmentioning
confidence: 99%
“…In addition to the above methods, helper or relay nodes have been introduced in [16]- [18] to further enhance the key generation performance. Apart from creating more usable channels, the relay nodes can also help generate artificial noise [16], [17], which contaminates the intercepted signals received by eavesdroppers, or helps enhance the randomness of the channel characteristics [17], [18], in such a fashion to increase secret key rates.…”
Section: Introductionmentioning
confidence: 99%
“…Second, the ciphertext size and the computational cost of ABE usually grow with the complexity of the access policy because of its expressiveness. By considering the limited battery and computational capabilities of the wireless and portable sensors/devices [9,10], the existing ABE scheme cannot be directly used to secure the OHSNs.…”
Section: Introductionmentioning
confidence: 99%