2010 Proceedings IEEE INFOCOM 2010
DOI: 10.1109/infcom.2010.5462004
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
154
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 197 publications
(154 citation statements)
references
References 18 publications
0
154
0
Order By: Relevance
“…The same information is reconciled and privacy amplification approaches are employed. Note that, theoretically, the bit length of the resulting quantization should be bounded by the mutual information between Alice and Bob [33]. In other words, the quantization level 2 should not be higher than the secret key capacity, that is, 2 ≤ 2 .…”
Section: The Secret Key Generationmentioning
confidence: 99%
“…The same information is reconciled and privacy amplification approaches are employed. Note that, theoretically, the bit length of the resulting quantization should be bounded by the mutual information between Alice and Bob [33]. In other words, the quantization level 2 should not be higher than the secret key capacity, that is, 2 ≤ 2 .…”
Section: The Secret Key Generationmentioning
confidence: 99%
“…Many researchers have proposed methods for establishing a secret key based on quantizing different aspects of the channel coefficients, such as the magnitude, phase, or both [9]- [11]. Recent works have included some techniques for multiple-input multipleoutput (MIMO) systems with increased secret key length and lower key bits disagreement which is commonly known as the key error rate (KER), [12]- [14]. Moreover, in [15], secret bits are generated using a probabilistic channel quantization approach (CQA) of the real and imaginary parts with channel decorrelation process to generate independent sequential quantized values.…”
Section: A Related Workmentioning
confidence: 99%
“…KGR describes the amount of key bits generated per time unit, and KDR denotes bit disagreement rates of the generated keys shared by legitimate nodes. In [9], [13] multiple nodes or multiple antennas at each node are exploited in order to create multiple usable common channels from which more key bits can be extracted within one channel coherence time period. Similarly, multiple independent or quasi-independent channels can be generated using frequency resources, such as channel hopping in [14], and OFDM signals in [12].…”
Section: Introductionmentioning
confidence: 99%