Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3232803
|View full text |Cite
|
Sign up to set email alerts
|

Towards Wireless Secret key Agreement with LoRa Physical Layer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Key generation security under passive eavesdropping has been validated in [8] through extensive ZigBee-based experiments. In particular, the work in [10] demonstrates that legitimate users can still generate keys securely by using LoRa, when the eavesdropper is located only 0.15 m or 2 m away.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Key generation security under passive eavesdropping has been validated in [8] through extensive ZigBee-based experiments. In particular, the work in [10] demonstrates that legitimate users can still generate keys securely by using LoRa, when the eavesdropper is located only 0.15 m or 2 m away.…”
Section: Discussionmentioning
confidence: 99%
“…There have been several long range standards designed for low-power wide area networks (LPWANs), including LoRa, Narrowband IoT, and Sigfox, etc. A very recent conference contribution applies key generation with LoRa [10], but the experiments are carried out in short-range environments, since the received power only has a 20 dBm variation. In contrast to short-range wireless communications, the channel conditions in long-range networks may vary significantly due to the shadowing of buildings in urban environments.…”
mentioning
confidence: 99%
“…PCA scheme outperforms all other schemes with a p value of 0.5004. Prior works on PSKG techniques, especially for LoRa 18 networks focus only on short range communications. In most of the practical scenarios such as vehicular communications, short range results may not be applicable.…”
Section: Secret Key Generation Between a Pair Of Usersmentioning
confidence: 99%
“…The OFDM demodulation process can obtain the subcarrier phase value, measure the frequency change, and generate the communication key. A very recent conference contribution [25] applies key generation with LoRa and takes received signal strength indication (RSSI) as the channel parameter, but the experiments are carried out in short-range environments since the received power only has a 20 dBm variation. Zhang and Marshall's work [26] take differential value, namely the difference between RSSI signals.…”
Section: Related Workmentioning
confidence: 99%