2016 IEEE Globecom Workshops (GC Wkshps) 2016
DOI: 10.1109/glocomw.2016.7849064
|View full text |Cite
|
Sign up to set email alerts
|

The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions

Abstract: Channel-reciprocity based key generation (CRKG) has gained significant importance as it has recently been proposed as a potential lightweight security solution for IoT devices. However, the impact of the attacker's position in close range has only rarely been evaluated in practice, posing an open research problem about the security of real-world realizations. Furthermore, this would further bridge the gap between theoretical channel models and their practice-oriented realizations. For security metrics, we util… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Key generation is subject to passive eavesdropping [6], [8], where the eavesdroppers record all the transmissions and try to crack the system. According to communication theory, when the eavesdropper is located sufficiently far from the legitimate users, the eavesdropping channel is uncorrelated with the legitimate channel.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Key generation is subject to passive eavesdropping [6], [8], where the eavesdroppers record all the transmissions and try to crack the system. According to communication theory, when the eavesdropper is located sufficiently far from the legitimate users, the eavesdropping channel is uncorrelated with the legitimate channel.…”
Section: Discussionmentioning
confidence: 99%
“…When C sk > 0, key generation can be carried out securely. Key generation security under passive eavesdropping has been validated in [8] through extensive ZigBee-based experiments. In particular, the work in [10] demonstrates that legitimate users can still generate keys securely by using LoRa, when the eavesdropper is located only 0.15 m or 2 m away.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As one of the few implementable physical layer security techniques, key generation can be constructed in current wireless devices. Many prototypes have been reported involving physical layer secret-key generation [122,[128][129][130]. However, thorough study examining the effects of environment conditions and channel parameters on the physical layer secret-key generation is still missing.…”
Section: G Physical Layer Security For Other 5g Scenarios and Beyondmentioning
confidence: 99%
“…Zenger et al [260] created an automated antenna positioning platform for repeatable experiments, in order to evaluate both the cross-correlation and the mutual information of the legitimate users and eavesdroppers. Testbeds of the IEEE 802.15.4 standard operating at 2.4 GHz were used and the RSS was relied upon as the keying parameter.…”
Section: ) Passive Eavesdroppingmentioning
confidence: 99%