2013
DOI: 10.1155/2013/935604
|View full text |Cite
|
Sign up to set email alerts
|

A Multihop Key Agreement Scheme for Wireless Ad Hoc NetworksBased on Channel Characteristics

Abstract: A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 49 publications
0
10
0
Order By: Relevance
“…Economic and pricing models as distributed solutions can maximize the secrecy capacity without requiring the perfect knowledge of all channel information. • Internal eavesdropper: An internal eavesdropper is an intermediate node in a path which is selected for relaying or forwarding the information [52]. It may be an untrusted relay node which tries to eavesdrop the information coming from the source.…”
Section: Eavesdropping Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Economic and pricing models as distributed solutions can maximize the secrecy capacity without requiring the perfect knowledge of all channel information. • Internal eavesdropper: An internal eavesdropper is an intermediate node in a path which is selected for relaying or forwarding the information [52]. It may be an untrusted relay node which tries to eavesdrop the information coming from the source.…”
Section: Eavesdropping Attackmentioning
confidence: 99%
“…Due to the broadcast nature of the wireless transmission, anyone within the communication range can intercept the source's information. An unauthorized receiver is called an eavesdropper [52]. Power allocation is the major approach used to improve secrecy capacity in that a friendly jammer allocates the Friendly Jamming (FJ) power to source-destination links.…”
Section: Eavesdropping Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Deviation of phase (or phase offset) was used to extract secret bits in [12][13][14][15]. To increase the key bit generation rate, Zeng et al exploited multiple-antenna diversity in [12] to generate secret keys for wireless nodes and implemented it on off-the-shelf 802.11n multiple-antenna devices.…”
Section: Extract Keys Using the Wireless Fading Channelmentioning
confidence: 99%
“…A cooperative key generation protocol was proposed in [14] to facilitate high rate key generation in narrowband fading channels with the aid of relay node(s). Zhuo et al [15] presented a multihop key establishment scheme based on the assumption that the network is biconnected, and the security of [15] is guaranteed against adversaries in a single path.…”
Section: Extract Keys Using the Wireless Fading Channelmentioning
confidence: 99%