2018
DOI: 10.1016/j.future.2016.12.013
|View full text |Cite
|
Sign up to set email alerts
|

An over-the-air key establishment protocol using keyless cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…A key ingredient of our solution is transmission anonymity, also known as source indistinguishably [8]- [11]. At each round, both A and B should guarantee that their transmission is anonymous, i.e., the probability of E to guess the actual transmitter should not be higher than a random guess.…”
Section: A Transmission Anonymitymentioning
confidence: 99%
See 1 more Smart Citation
“…A key ingredient of our solution is transmission anonymity, also known as source indistinguishably [8]- [11]. At each round, both A and B should guarantee that their transmission is anonymous, i.e., the probability of E to guess the actual transmitter should not be higher than a random guess.…”
Section: A Transmission Anonymitymentioning
confidence: 99%
“…Another solution exploiting source indistinguishability is provided in [11]. Nevertheless, their solution requires preliminary phases, i.e., initialization, training, and signal transmission, which introduces delay in the overall protocol.…”
Section: Introductionmentioning
confidence: 99%
“…2) Key Establishment using Keyless Cryptography Technology: Alpern and Schneider designed a key-establishment protocol in [179] using keyless cryptography technology, and it was improved by [180]- [182]. In these protocols, the characteristics of the anonymous channel are utilized to establish secret keys.…”
Section: A Lightweight Authenticationmentioning
confidence: 99%
“…Completing the above operations, two vehicles (say Alice and Bob) can establish a secret key with |k | bits. To assess the efficiency of keyless cryptography, an analysis in [182] was conducted and keyless cryptography was compared with Diffie-Hellman key exchange protocol (as a well-known asymmetric cryptography approach) in terms of energy and time consumption. The most interesting finding was that, using IEEE 802.15.4 CSMA/CA medium access control (MAC) protocol, keyless cryptography uses 159 times less energy than Diffie-Hellman protocol.…”
Section: A Lightweight Authenticationmentioning
confidence: 99%
“…Suppose we have a set of n nodes. In its general form, called the multi-party scenario, the key distribution problem is not restricted to only pairs of users, but it must enable any arbitrary subset of these n nodes to determine a shared key [2]. A trivial solution to this problem is that a Trusted Authority (TA) generates M = 2 n − n − 1 symmetric keys, and assigns each to one of the M subsets with at least two members.…”
Section: Introductionmentioning
confidence: 99%