2014
DOI: 10.1109/tmc.2014.2310747
|View full text |Cite
|
Sign up to set email alerts
|

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation

Abstract: Abstract-Secret key generation among wireless devices using physical layer information of radio channel has been an attractive alternative for ensuring security in mobile environments. Received signal strength (RSS) based secret key extraction gains much attention due to its easy accessibility in wireless infrastructure. However, the problem of using RSS to generate keys among multiple devices to ensure secure group communication in practice remains open. In this work, we propose a framework for collaborative … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
76
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 130 publications
(76 citation statements)
references
References 40 publications
0
76
0
Order By: Relevance
“…Therefore, randomness is the most important feature of the generated key sequence. We use National Institute of Standards and Technology (NIST) randomness test suite [27] to verify the randomness of the key sequence, which is also used by many other researchers [9], [10], [12], [13], [18].…”
Section: B Randomnessmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, randomness is the most important feature of the generated key sequence. We use National Institute of Standards and Technology (NIST) randomness test suite [27] to verify the randomness of the key sequence, which is also used by many other researchers [9], [10], [12], [13], [18].…”
Section: B Randomnessmentioning
confidence: 99%
“…There have been several practical key generation systems reported, employing IEEE 802.11 [9]- [14], IEEE 802.15.4 [15]- [18], ultrawideband (UWB) [19], TV and radio signals [20]. IEEE 802.11 is the most widely adopted wireless technique in key generation due to its widespread application in our daily life.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent researches have turned attentions to quantum cryptography using physical layer characteristics, such as channel and noise measurement, as a source of randomness to generate the secret keys [7]- [17]. As an example, [7] used RSS for key generation in indoor and outdoor environments with lower Bit Mismatch Rate (BMR).…”
Section: Introductionmentioning
confidence: 99%
“…Since then, several tree-based algorithms have been developed to achieve the group secret key capacity for the multi-terminal pairwise independent network (PIN) [11]- [15]. On the other hand, effective group key generation algorithms have been proposed for wireless networks by exploiting channel characteristics in [28]- [30]. These algorithms are more practical for real systems at the expense of some scarification in the group key rate.…”
mentioning
confidence: 99%