2017
DOI: 10.1155/2017/7393526
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase

Abstract: Exploiting the inherent physical properties of wireless channels to complement or enhance the traditional security mechanisms has attracted prominent attention recently. However, the existing secret key generation schemes suffer from miscellaneous extracting procedure. Many PHY-layer authentication schemes assume that the knowledge of the shared key is preknown. In this paper, we propose PHY-layer secret key generation and authentication schemes for orthogonal frequency-division multiplexing (OFDM) systems. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
29
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(29 citation statements)
references
References 31 publications
0
29
0
Order By: Relevance
“…The other studies use a key generation system consisting of four phases [40,41,42]. These phases include the measurement of channel characteristics, quantization, error-correcting, and privacy amplification.…”
Section: Key Generation System Overviewmentioning
confidence: 99%
“…The other studies use a key generation system consisting of four phases [40,41,42]. These phases include the measurement of channel characteristics, quantization, error-correcting, and privacy amplification.…”
Section: Key Generation System Overviewmentioning
confidence: 99%
“…In contrast, time-varying reflects the changes in the channel state and affects the efficiency of key generation. The physical layer information measurement of the wireless channel can be collected using the channel state information (CSI) [5][6][7][8][9], received signal strength (RSS) [10][11][12][13][14][15], or phase [16][17][18]. Compared with the CSI and phase, the RSSbased key generation mechanism can be directly applied to the off-the-shelf wireless devices without any hardware modification.…”
Section: Introductionmentioning
confidence: 99%
“…This setting is configured between them by considering the demands of the system and the user interface. In literature, the key generation method is separated into four stages including the channel probing, quantization, information reconciliation and privacy amplification [4][5][6].…”
Section: Introductionmentioning
confidence: 99%