2017
DOI: 10.1109/tvt.2016.2582853
|View full text |Cite
|
Sign up to set email alerts
|

Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…The other operations are the same as those of the scheme in [135]. The reference-channel based scheme has to carry out pairwise channel probing between two users, which was found inefficient by the study of Jin et al in pairwise-based multiuser key generation [245]. A pair of scheduling algorithms were discussed, namely serial and parallel probing.…”
Section: ) Star Topologymentioning
confidence: 99%
“…The other operations are the same as those of the scheme in [135]. The reference-channel based scheme has to carry out pairwise channel probing between two users, which was found inefficient by the study of Jin et al in pairwise-based multiuser key generation [245]. A pair of scheduling algorithms were discussed, namely serial and parallel probing.…”
Section: ) Star Topologymentioning
confidence: 99%
“…The above mainly described the key establishment process between two nodes. In fact, these scenarios where a single user needs to establish keys with multiple users are quite common, e.g., roadside units (RSUs) with vehicles [25]. Alhasanat et al [26] proposed a novel physical layer key distribution mechanism for IoT networks.…”
Section: Related Workmentioning
confidence: 99%
“…• Co-located Attacks: The correlation of channel measurements is determined by the distance between the eavesdropper and Alice/Bob. In the existing works [3], [4], if the eavesdropper is co-located to Alice or Bob, he/she will observe channel measurements that are highly correlated with Alice or Bob. Therefore, most existing works are vulnerable to co-located eavesdroppers.…”
Section: B Limitations In Existing Schemesmentioning
confidence: 99%
“…That is, the secrecy of the generated key is not dependent on the hardness of a computational problem but relies on the physical laws of the wireless fading channels. For instance, wireless devices measure highly correlated wireless channel characteristics and use them as shared random sources to generate a shared key [3]. In theory, in a rich multi-path scattering environment, a passive eavesdropper who is more than a half-wavelength away from legitimate users will obtain un-correlated channel measurements, thus cannot infer much information about the generated key.…”
Section: Introductionmentioning
confidence: 99%