2014
DOI: 10.1145/2541289
|View full text |Cite
|
Sign up to set email alerts
|

Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration

Abstract: Secret key establishment is a fundamental requirement for private communication between two entities. In this article, we propose and evaluate a new approach for secret key extraction where multiple sensors collaborate in exchanging probe packets and collecting channel measurements. Essentially, measurements from multiple channels have a substantially higher differential entropy compared to the measurements from a single channel, thereby resulting in more randomness in the information source for key extraction… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(19 citation statements)
references
References 26 publications
0
19
0
Order By: Relevance
“…Thus the sequences of zeros and ones that Alice and Bob create might have some discrepancies. These are reconciled, either through some form of error correction [5], [15] or through some reconciliation protocol like Cascade [12]. There are also some cases where the scheme sacrifices entropy and randomness to result in two sequences that are completely similar after quantization, as seen in [16].…”
Section: Prior Workmentioning
confidence: 99%
“…Thus the sequences of zeros and ones that Alice and Bob create might have some discrepancies. These are reconciled, either through some form of error correction [5], [15] or through some reconciliation protocol like Cascade [12]. There are also some cases where the scheme sacrifices entropy and randomness to result in two sequences that are completely similar after quantization, as seen in [16].…”
Section: Prior Workmentioning
confidence: 99%
“…Since X is publicly known to every node in the system, Bob is able to obtain the waveform observation K b , which in the frequency domain for the purpose of secret key extraction is shown in (9).…”
Section: /2 2bmentioning
confidence: 99%
“…It is noted that G 3 · W * {a,b } • H 2 and H 2 · W * {a,b } • G 3 are equivalent. The noise terms, i.e., the last two terms in both (9) and (11), reduce the correlation coefficients between K a and K b , and hence limit the achievable secret key rates of the proposed system. These aspects are investigated in Section IV.…”
Section: /2 2bmentioning
confidence: 99%
See 2 more Smart Citations