2014
DOI: 10.1007/978-3-319-11203-9_30
|View full text |Cite
|
Sign up to set email alerts
|

A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks

Abstract: Cryptographic keys are necessary to secure communications among mesh clients in wireless mesh networks. Traditional key establishment schemes are implemented at higher layers, and the security of most such designs relies on the complexity of computational problems. Extracting cryptographic keys at the physical layer is a promising approach with information-theoretical security. But due to the nature of communications at the physical layer, none of the existing designs supports key establishment if communicatin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Network communication protocols will also grow as they develop. When data are passed between networks, it will involve authentication, key negotiation (Yang, Li, Kong et al, 2018), data confidentiality and integrity protection, and many other issues, and will also face more prominent security issues (Nguyen et al, 2016;Zhang et al, 2014). The process of processing and applying the medical data collected at the application layer requires security measures to protect it.…”
Section: A Three-tier Architecture For the Iomtmentioning
confidence: 99%
“…Network communication protocols will also grow as they develop. When data are passed between networks, it will involve authentication, key negotiation (Yang, Li, Kong et al, 2018), data confidentiality and integrity protection, and many other issues, and will also face more prominent security issues (Nguyen et al, 2016;Zhang et al, 2014). The process of processing and applying the medical data collected at the application layer requires security measures to protect it.…”
Section: A Three-tier Architecture For the Iomtmentioning
confidence: 99%
“…[51], Wang et al [52], Premnath et al [53], and Zhanget et al [54] also proposed a secret key generating method based on the phase information of channel response. However, the method proposed in [50] is particularly suitable for wideband channel, whereas the method proposed in [52] is specifically suitable for narrowband channel.…”
Section: Frequency Selectivitymentioning
confidence: 99%