2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall) 2015
DOI: 10.1109/vtcfall.2015.7390857
|View full text |Cite
|
Sign up to set email alerts
|

Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(29 citation statements)
references
References 7 publications
0
23
0
Order By: Relevance
“…The variation over time of the RSS caused by motion and multipath fading can be quantized and used for generating secret keys. Most RSSbased key generation schemes are mainly applied in IEEE 802.11 [2], [10]- [12] and IEEE 802.15.4 systems [13], [14]. However, only one RSS value can be obtained from each packet/frame, which limits the key generation rate.…”
Section: Related Workmentioning
confidence: 99%
“…The variation over time of the RSS caused by motion and multipath fading can be quantized and used for generating secret keys. Most RSSbased key generation schemes are mainly applied in IEEE 802.11 [2], [10]- [12] and IEEE 802.15.4 systems [13], [14]. However, only one RSS value can be obtained from each packet/frame, which limits the key generation rate.…”
Section: Related Workmentioning
confidence: 99%
“…While many works have focused on extracting secret keys (e.g. to be used for encryption and decryption of user data), such as [7], [8], [9], the focus of our work is to identify the original transmitter of data packets by exploiting the related PHY metadata.…”
Section: Related Workmentioning
confidence: 99%
“…In [2] a good overview on this topic is given. While many works have focused on extracting secret keys between two communicating devices, such as [3], [4], [5], the focus of our work is on guaranteeing secure transmission with respect to authenticity of data packets from one device to another. One of the first works considering that idea has been for example [6], where an approach based on simulation of the wireless channel and hypothesis testing is presented for static scenarios and is later in [7] extended to time-variant scenarios.…”
Section: Related Workmentioning
confidence: 99%